Journal on Communications ›› 2023, Vol. 44 ›› Issue (4): 38-49.doi: 10.11959/j.issn.1000-436x.2023063
• Papers • Previous Articles Next Articles
Zijing JIANG, Qun DING
Revised:
2023-01-20
Online:
2023-04-25
Published:
2023-04-01
Supported by:
CLC Number:
Zijing JIANG, Qun DING. Nove lincidence matrix differential power analysis for resisting ghost peak[J]. Journal on Communications, 2023, 44(4): 38-49.
"
算法 | 攻击位置 | 防护措施 | IMDPA/条 | DPA/条 | EDPA/条 | MDPA/条 |
AES-128 | 寄存器A | 无防护 | 3 000 | 10 000+ | 10 000+ | 10 000+ |
AES-128 | 寄存器B | 无防护 | 1 500 | 10 000 | 4 000 | 1 500 |
AES-128 | 寄存器B | 引入噪声 | 1 000 | 10 000+ | 10 000+ | 1 000 |
AES-128 | 寄存器B | 插入冗余操作 | 6 000 | 10 000 | 9 000 | 6 000 |
AES-128 | 寄存器B | 双轨逻辑电路 | 7 000 | 10 000 | 8 000 | 8 000 |
AES-128 | 寄存器B | 随机时钟 | 1 500 | 1 500 | 1 500 | 1 500 |
SM4 | 首轮轮函数输出寄存器 | 无防护 | 1 000 | 8 000 | 10 000+ | 1 000 |
[1] | KOCHER P C , . Timing attacks on implementations of diffie-Hellman,RSA,DSS,and other systems[C]// Advances in Cryptology —CRYPTO ’96. Berlin:Springer, 1996: 104-113. |
[2] | KOCHER P , JAFFE J , JUN B . Differential power analysis[C]// Advances in Cryptology — CRYPTO’ 99. Berlin:Springer, 1999: 388-397. |
[3] | BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model[C]// International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2004: 16-29. |
[4] | CHéRISEY E D , GUILLEY S , RIOUL O ,et al. Best information is most successful[C]// Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2019: 49-79. |
[5] | CHARI S , RAO J R , ROHATGI P . Template attacks[C]// Cryptographic Hardware and Embedded Systems - CHES 2002. Berlin:Springer, 2003: 13-28. |
[6] | AGRAWAL D , ARCHAMBEAULT B , RAO J R ,et al. The EM side—channel(s)[C]// Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2002: 29-45. |
[7] | MONTMINY D P , BALDWIN R O , TEMPLE M A ,et al. Differential electromagnetic attacks on a 32-bit microprocessor using software defined radios[J]. IEEE Transactions on Information Forensics and Security, 2013,8(12): 2101-2114. |
[8] | SCHRAMM K , WOLLINGER T , PAAR C . A new class of collision attacks and its application to DES[C]// International Workshop on Fast Software Encryption. Berlin:Springer, 2003: 206-222. |
[9] | BOGDANOV A , KIZHVATOV I . Beyond the limits of DPA:combined side-channel collision attacks[J]. IEEE Transactions on Computers, 2012,61(8): 1153-1164. |
[10] | BIHAM E , SHAMIR A . Differential fault analysis of secret key cryptosystems[C]// Advances in Cryptology — CRYPTO’97. Berlin:Springer, 1997: 513-525. |
[11] | LI Y , SAKIYAMA K , GOMISAWA S ,et al. Fault sensitivity analysis[C]// International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2010: 320-334. |
[12] | WANG A , CHEN M , WANG Z Y ,et al. Fault rate analysis:breaking masked AES hardware implementations efficiently[J]. IEEE Transactions on Circuits and Systems II:Express Briefs, 2013,60(8): 517-521. |
[13] | PROUFF E , STRULLU R , BENADJILA R ,et al. Study of deep learning techniques for side-channel analysis and introduction to ASCAD database[J]. IACR Cryptology ePrint Archive,2018, 2018:53. |
[14] | ROBYNS P , QUAX P , LAMOTTE W . Improving CEMA using correlation optimization[C]// Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2018: 1-24. |
[15] | CARBONE M , CONIN V , CORNéLIE M A ,et al. Deep learning to evaluate secure RSA implementations[C]// Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2019: 132-161. |
[16] | SCHRAMM K , PAAR C . Higher order masking of the AES[C]// Topics in Cryptology - CT-RSA 2006. Berlin:Springer, 2006: 208-225. |
[17] | LO O , BUCHANAN W J , CARSON D . Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)[J]. Journal of Cyber Security Technology, 2017,1(2): 88-107. |
[18] | MAHANTA H J , KHAN A K . Improving power analysis peak distribution using Canberra distance to address ghost peak problem[J]. International Journal of Information Security and Privacy, 2018,12(3): 27-41. |
[19] | CHEN J C , NG J S , CHONG K S ,et al. A novel normalized variance-based differential power analysis against masking countermeasures[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 3767-3779. |
[20] | GUILLEY S , HOOGVORST P , PACALET R . Differential power analysis model and some results[C]// IFIP International Federation for Information Processing. Boston:Springer US, 2004: 127-142. |
[21] | KAMOUN N , BOSSUET L , GHAZEL A . Correlated power noise generator as a low cost DPA countermeasures to secure hardware AES cipher[C]// Proceedings of 2009 3rd International Conference on Signals,Circuits and Systems (SCS). Piscataway:IEEE Press, 2010: 1-6. |
[22] | STEFAN M , ELISABETH O , THOMAS P . 能量分析攻击[M]. 冯登国,周永彬,刘继业,等译, 北京: 科学出版社, 2010. |
STEFAN M , ELISABETH O , THOMAS P . Energy analysis attack[M]. Translated by FENG D G,ZHOU Y B,LIU J Y,et al. Beijng: Science Press, 2010. | |
[23] | BELLIZIA D , SCOTTI G , TRIFILETTI A . Implementation of the PRESENT-80 block cipher and analysis of its vulnerability to side channel attacks exploiting static power[C]// Proceedings of 2016 MIXDES - 23rd International Conference Mixed Design of Integrated Circuits and Systems. Piscataway:IEEE Press, 2016: 211-216. |
[24] | HOMMA N , NAGASHIMA S , SUGAWARA T ,et al. A high-resolution phase-based waveform matching and its application to side-channel attacks[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2008,91(1): 193-202. |
[1] | Ming TANG, Yifan HU. Load-to-store: exploit the time leakage of store buffer transient window [J]. Journal on Communications, 2023, 44(4): 64-77. |
[2] | Shaoyu DU. Improved integral attack——random linear distinguish and key recovery attack [J]. Journal on Communications, 2023, 44(4): 145-153. |
[3] | Bin WANG, Si CHEN, Jiadong CHEN, Xing WANG. DWB-AES: an implementation of dynamic white-box based on AES [J]. Journal on Communications, 2021, 42(2): 177-186. |
[4] | Jiuxing JIANG,Jiao HOU,Hai HUANG,Yuying ZHAO,Xinxin FENG. Research on area-efficient low-entropy masking scheme for AES [J]. Journal on Communications, 2019, 40(5): 201-210. |
[5] | Zhi-bo DU,UNYuan-hua S,ANGYi W. Multi-point joint power analysis attack against AES [J]. Journal on Communications, 2016, 37(Z1): 78-84. |
[6] | Min WANG,Zhen WU,Jin-tao RAO,Hang LING. Round reduction-based fault attack on SM4 algorithm [J]. Journal on Communications, 2016, 37(Z1): 98-103. |
[7] | Zhi-bo DU,Zhen WU,Min WANG,Jin-tao RAO. Improved chosen-plaintext power analysis attack against SM4 at the round-output [J]. Journal on Communications, 2015, 36(10): 85-91. |
[8] | Le DONG,Wen-ling WU,Shuang WU,Jian ZHOU. Novel method of constructing the zero-sum distinguishers [J]. Journal on Communications, 2012, 33(11): 91-99. |
[9] | Xin-jie ZHAO,Shi-ze GUO,Tao WANG,Hui-ying LIU. Improved Cache trace driven attack on AES and CLEFIA [J]. Journal on Communications, 2011, 32(8): 101-110. |
[10] | Xiao-li DONG,Yu-pu HU,Jie CHEN,Shun-bo LI,Yang YANG. Improved meet-in-the-middle attacks on 7-round AES-192 and 8-round AES-256 [J]. Journal on Communications, 2010, 31(9A): 197-201. |
[11] | Jun HAN,Xiao-yang ZENG,Jia ZHAO. VLSI implementation of AES algorithm against differential power attack and differential fault attack [J]. Journal on Communications, 2010, 31(1): 20-29. |
[12] | Jian-jun GUO,Ming CHEN,Jian-yin ZHANG,Zhi-chao ZHAO. Research on DRM system design and real-time content protection in IPTV [J]. Journal on Communications, 2008, 29(11A): 66-71. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|