Journal on Communications ›› 2018, Vol. 39 ›› Issue (8): 83-93.doi: 10.11959/j.issn.1000-436x.2018130

• Artificial Intelligence and Network Security • Previous Articles     Next Articles

Template attack of Crypto chip based on clustering

Zhen WU,Zhibo DU(),Min WANG,Chunling XIANG   

  1. College of Information Security Engineering,Chengdu University of Information Technology,Chengdu 610225,China
  • Revised:2018-07-16 Online:2018-08-01 Published:2018-09-13
  • Supported by:
    The National Science and Technology Major Project of China(2014ZX01032401);The National High Technology Research and Development Program of China (863 Program)(2012AA01A40);The “13th Five-Years” National Cryptogram Development Fund(MMJJ20180244);Sichuan Science and Technology Support Programmer(2017GZ0313);Sichuan Provincial Education Department Key Scientific Research Projects(17ZB0082)

Abstract:

The known-key establishment template and others full control of experimental equipment preconditions are required to implement the traditional template attack.The preconditions restrict the application scenario of template attack.The template attack is only applied to the device that the key input can be controlled.In order to resolve the restrictive preconditions,a novel method of template attack based on clustering was proposed.The clustering EM algorithm was modified according to the characteristics of information leakage model in the method.The modified clustering methods accurately fitted the leaked information probability model in the case of unknown key,the location of information leakage could be determined.Then the attack established the templates in the location,and implemented template matching.The proposed method eliminates the dependence of traditional template attacks on per-conditions and expand the application scenario of template attack.

Key words: side channel attack, template attack, clustering, EM algorithm

CLC Number: 

No Suggested Reading articles found!