首页> 外文期刊>Journal of Electronic Testing: Theory and Applications: Theory and Applications >A Comprehensive FPGA-Based Assessment on Fault-Resistant AES against Correlation Power Analysis Attack
【24h】

A Comprehensive FPGA-Based Assessment on Fault-Resistant AES against Correlation Power Analysis Attack

机译:基于FPGA的针对相关功率分析攻击的容错AES的综合评估

获取原文
获取原文并翻译 | 示例
           

摘要

The secret key used in a cryptosystem can be retrieved by physical attacks such as side-channel analysis (SCA) and fault analysis (FA) attacks. Traditionally, countermeasures for different physical attacks are developed in a separate fashion. To lay a solid foundation for countermeasure development for the emerging combined attacks, it is imperative to thoroughly study how the countermeasure for one attack affects the efficiency of other attack. In this work, we use a FPGA-based platform to investigate whether and how the FA countermeasure can influence the efficiency of the correlation power analysis (CPA) attack. Unlike the previous work using simulations on the S-Box only, our assessments are based on the FPGA emulation of the entire AES. In addition to considering different error detection codes, we compare the key retrieval speed of the CPA attack in the scenarios of using different power models, redundancy types for fault detection, modules under fault protection, and practical FPGA synthesis optimization. Furthermore, we propose a new countermeasure that integrates dynamic masking and error deflection to simultaneously thwart CPA and FA attacks. Experimental results show that for 100,000 power traces, our method successfully prevents the key leakage while other methods leak at least five AES subkey bytes. Meanwhile, our simulation also confirms that the proposed method reduces the success rate of FA attacks by up to 90 % over the other methods.
机译:密码系统中使用的秘密密钥可以通过物理攻击(例如边信道分析(SCA)和故障分析(FA)攻击)来检索。传统上,针对不同物理攻击的对策是以单独的方式开发的。为了为新兴的联合攻击的对策发展打下坚实的基础,必须深入研究一种攻击的对策如何影响另一种攻击的效率。在这项工作中,我们使用基于FPGA的平台来研究FA对策是否以及如何影响相关功率分析(CPA)攻击的效率。与之前仅在S-Box上使用仿真的工作不同,我们的评估基于整个AES的FPGA仿真。除了考虑不同的错误检测代码外,我们还比较了使用不同功率模型,故障检测的冗余类型,故障保护下的模块以及实际的FPGA综合优化方案下CPA攻击的关键检索速度。此外,我们提出了一种新的对策,该对策集成了动态屏蔽和错误纠正功能,以同时阻止CPA和FA攻击。实验结果表明,对于100,000条功率迹线,我们的方法成功地防止了密钥泄漏,而其他方法则泄漏了至少五个AES子密钥字节。同时,我们的仿真也证实了与其他方法相比,该方法将FA攻击的成功率降低了90%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号