...
首页> 外文期刊>The Journal of Systems and Software >How many interesting points should be used in a template attack?
【24h】

How many interesting points should be used in a template attack?

机译:模板攻击应使用几个有趣的点?

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Considering that one can fully characterize and exploit the power leakages of the reference device in the process of recovering the secret key used by the target device, template attack (TA) is broadly accepted as the strongest power analysis attack from the perspective of information theory. In order to fully exploit the power leakages of the reference device, one usually has to concern the power leakages at different interesting points. Then, a natural question is how many interesting points should be used in a TA? We note that the number of interesting points one uses directly decides the profiling efficiency of TA. In light of this, we evaluate the optimal number of interesting points in simulated scenarios, and the evaluation results bring us an empirically useful formula. Then, in order to validate the empirical formula, we perform TA using power traces provided by DPA Contest v4.1. In the real scenario, the correlation method is used to select the interesting points, and the S-Box output of the 1 st round AES encryption is chosen as the target intermediate value. Evaluation results show that the empirical formula is indeed correct and can be useful in practice.
机译:考虑到在恢复目标设备使用的密钥的过程中可以充分表征和利用参考设备的电源泄漏,从信息论的角度出发,模板攻击(TA)被广泛认为是最强大的功耗分析攻击。为了充分利用参考设备的漏电,通常必须关注不同关注点的漏电。那么,一个自然的问题是在技术援助中应该使用多少个有趣的观点?我们注意到,一个人使用的有趣点的数量直接决定了TA的配置效率。有鉴于此,我们评估了模拟场景中的兴趣点的最佳数量,并且评估结果为我们带来了经验上有用的公式。然后,为了验证经验公式,我们使用DPA Contest v4.1提供的功率曲线执行TA。在实际场景中,采用相关方法选择感兴趣的点,并选择第一轮AES加密的S-Box输出作为目标中间值。评价结果表明,经验公式的确是正确的,可以在实践中使用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号