首页> 外文OA文献 >Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
【2h】

Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

机译:侧信道攻击中快速且内存有效的密钥恢复

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Side-channel attacks are powerful techniques to attack implementations of cryptographic algorithms by observing its physical parameters such as power consumption and electromagnetic radiation that are modulated by the secret state. Most side-channel attacks are of divide-and-conquer nature, that is, they yield a ranked list of secret key chunks, e.g., the subkey bytes in AES. The problem of the key recovery is then to find the correct combined key.An optimal key enumeration algorithm (OKEA) was proposed by Charvillon et al. at SAC’12. Given the ranked key chunks together with their probabilities, this algorithm outputs the full combined keys in the optimal order – from more likely to less likely ones. OKEA uses plenty of memory by its nature though, which limits its practical efficiency. Especially in the cases where the side-channel traces are noisy, the memory and running time requirements to find the right key can be prohibitively high.To tackle this problem, we propose a score-based key enumeration algorithm (SKEA). Though it is suboptimal in terms of the output order of candidate combined keys, SKEA’s memory and running time requirements are more practical than those of OKEA. We verify the advantage at the example of a DPA attack on an 8-bit embedded software implementation of AES-128. We vary the number of traces available to the adversary and report a significant increase in the success rate of the key recovery due to SKEA when compared to OKEA, within practical limitations on time and memory. We also compare SKEA to the probabilistic key enumeration algorithm (PKEA) by Meier and Staffelbach and show its practical superiority in this case.SKEA is efficiently parallelizable. We propose a high-performance solution for the entire conquer stage of side-channel attacks that includes SKEA and the subsequent full key testing, using AES-NI on Haswell Intel CPUs.
机译:旁信道攻击是一种强大的技术,可通过观察密码算法的物理参数(例如由秘密状态调制的功耗和电磁辐射)来攻击密码算法的实现。大多数边信道攻击具有分而治之的性质,也就是说,它们会产生一系列的秘密密钥块列表,例如AES中的子密钥字节。然后,密钥恢复的问题是找到正确的组合密钥。Charvillon等人提出了一种最佳密钥枚举算法(OKEA)。在SAC’12。给定排名的密钥块及其概率,该算法将以最佳顺序输出完整组合的密钥-从可能性更高的密钥到可能性更低的密钥。但是,OKEA本质上会使用大量内存,这限制了它的实际效率。尤其是在边通道轨迹嘈杂的情况下,找到正确密钥的内存和运行时间要求可能会非常高。针对此问题,我们提出了一种基于分数的密钥枚举算法(SKEA)。尽管在候选组合键的输出顺序上不是最佳选择,但SKEA的内存和运行时间要求比OKEA更为实用。我们以针对8位嵌入式软件AES-128的DPA攻击为例验证了这一优势。我们改变了对手可用的跟踪数量,并报告了与OKEA相比,由于SKEA而导致的密钥恢复成功率显着提高,而时间和内存却受到实际限制。我们还将SKEA与Meier和Staffelbach的概率密钥枚举算法(PKEA)进行了比较,并显示了在这种情况下的实用优势.SKEA是可高效并行化的。我们在Haswell Intel CPU上使用AES-NI,为侧通道攻击的整个征服阶段(包括SKEA和后续的完整密钥测试)提出了一种高性能解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号