通信学报 ›› 2018, Vol. 39 ›› Issue (8): 83-93.doi: 10.11959/j.issn.1000-436x.2018130

• 论文Ⅰ:人工智能与网络安全 • 上一篇    下一篇

密码芯片基于聚类的模板攻击

吴震,杜之波(),王敏,向春玲   

  1. 成都信息工程大学网络空间安全学院,四川 成都 610225
  • 修回日期:2018-07-16 出版日期:2018-08-01 发布日期:2018-09-13
  • 作者简介:吴震(1975-),男,江苏苏州人,成都信息工程大学副教授,主要研究方向为信息安全、密码学、侧信道攻击与防御、信息安全设备设计与检测。|杜之波(1982-),男,山东冠县人,成都信息工程大学副教授,主要研究方向为信息安全、侧信道攻击与防御、天线应用和物联网安全。|王敏(1977-),女,四川资阳人,成都信息工程大学副教授,主要研究方向为网络攻防、侧信道攻击与防御。|向春玲(1990-),女,湖北宜昌人,成都信息工程大学助教,主要研究方向为信息安全、嵌入式系统安全、侧信道攻击与防御。
  • 基金资助:
    国家科技重大专项基金资助项目(2014ZX01032401);国家高技术研究发展计划(“863”计划)基金资助项目(2012AA01A40);“十三五”国家密码发展基金资助项目(MMJJ20180244);四川省科技支撑计划项目基金资助(2017GZ0313);四川省教育厅重点科研基金资助项目(17ZB0082)

Template attack of Crypto chip based on clustering

Zhen WU,Zhibo DU(),Min WANG,Chunling XIANG   

  1. College of Information Security Engineering,Chengdu University of Information Technology,Chengdu 610225,China
  • Revised:2018-07-16 Online:2018-08-01 Published:2018-09-13
  • Supported by:
    The National Science and Technology Major Project of China(2014ZX01032401);The National High Technology Research and Development Program of China (863 Program)(2012AA01A40);The “13th Five-Years” National Cryptogram Development Fund(MMJJ20180244);Sichuan Science and Technology Support Programmer(2017GZ0313);Sichuan Provincial Education Department Key Scientific Research Projects(17ZB0082)

摘要:

传统的模板攻击需要已知密钥建模等对实验设备完全控制的前置条件来实施攻击,该前置条件限制了模板攻击的应用场景,使模板攻击只能应用于可以控制密钥输入的设备。为了解决该问题,提出了基于聚类的模板攻击方法。该方法根据信息泄露模型的特征对聚类期望最大值(EM)算法进行改造,使改造后的聚类方法能够较为准确地拟合出泄露信息的概率模型,在未知密钥的情况下,即可确定信息泄露的位置。该方法通过建模进行模板匹配,消除了传统模板攻击对已知密钥建模等前置条件的依赖,从而扩大了模板攻击的应用范围。

关键词: 侧信道攻击, 模板攻击, 聚类, EM算法

Abstract:

The known-key establishment template and others full control of experimental equipment preconditions are required to implement the traditional template attack.The preconditions restrict the application scenario of template attack.The template attack is only applied to the device that the key input can be controlled.In order to resolve the restrictive preconditions,a novel method of template attack based on clustering was proposed.The clustering EM algorithm was modified according to the characteristics of information leakage model in the method.The modified clustering methods accurately fitted the leaked information probability model in the case of unknown key,the location of information leakage could be determined.Then the attack established the templates in the location,and implemented template matching.The proposed method eliminates the dependence of traditional template attacks on per-conditions and expand the application scenario of template attack.

Key words: side channel attack, template attack, clustering, EM algorithm

中图分类号: 

No Suggested Reading articles found!