Journal on Communications ›› 2014, Vol. 35 ›› Issue (3): 157-167.doi: 10.3969/j.issn.1000-436x.2014.03.018
• Academic paper • Previous Articles Next Articles
Xiao-juan WANG1,Shi-ze GUO2,Xin-jie ZHAO2,3,Mei SONG1,Fan ZHANG4
Online:
2014-03-25
Published:
2017-08-17
Supported by:
Xiao-juan WANG,Shi-ze GUO,Xin-jie ZHAO,Mei SONG,Fan ZHANG. Research of power preprocessing optimization-based template attack on LED[J]. Journal on Communications, 2014, 35(3): 157-167.
"
原始秘钥 | 匹配密钥 | |||||||||||||||
0000 | 0001 | 0010 | 0011 | 0100 | 0101 | 0110 | 0111 | 1000 | 1001 | 1010 | 1011 | 1100 | 1101 | 1110 | 1111 | |
0000 | 0.31 | 0.12 | 0.25 | 0.07 | 0.01 | 0.01 | 0 | 0 | 0.03 | 0 | 0 | 0 | 0.04 | 0.14 | 0 | 0 |
0001 | 0.32 | 0.37 | 0.12 | 0.01 | 0 | 0.03 | 0 | 0 | 0.06 | 0 | 0 | 0 | 0.02 | 0.08 | 0 | 0 |
0010 | 0.28 | 0.03 | 0.39 | 0.02 | 0 | 0.02 | 0 | 0 | 0.07 | 0 | 0 | 0 | 0.15 | 0.04 | 0 | 0 |
0011 | 0.02 | 0.01 | 0.02 | 0.55 | 0.11 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.3 | 0 | 0 |
0100 | 0 | 0 | 0 | 0.25 | 0.48 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.26 | 0 | 0 |
0101 | 0.03 | 0.01 | 0.09 | 0 | 0 | 0.25 | 0.04 | 0.04 | 0.2 | 0.01 | 0.22 | 0 | 0.12 | 0 | 0 | 0 |
0110 | 0 | 0 | 0 | 0 | 0 | 0.02 | 0.75 | 0 | 0.01 | 0 | 0 | 0.22 | 0 | 0 | 0 | 0 |
0111 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.7 | 0 | 0.27 | 0.03 | 0 | 0 | 0 | 0 | 0 |
1000 | 0.11 | 0.07 | 0.03 | 0 | 0 | 0.23 | 0 | 0 | 0.49 | 0 | 0 | 0 | 0.05 | 0.01 | 0 | 0 |
1001 | 0 | 0 | 0.02 | 0 | 0 | 0.02 | 0 | 0.14 | 0.03 | 0.47 | 0.08 | 0 | 0.24 | 0 | 0 | 0 |
1010 | 0 | 0 | 0.02 | 0 | 0 | 0.06 | 0.01 | 0.32 | 0.02 | 0.04 | 0.48 | 0 | 0.05 | 0 | 0 | 0 |
1011 | 0 | 0 | 0 | 0 | 0 | 0 | 0.11 | 0 | 0 | 0 | 0 | 0.88 | 0 | 0 | 0 | 0 |
1100 | 0.05 | 0.01 | 0.08 | 0 | 0 | 0.22 | 0 | 0 | 0.29 | 0.02 | 0.01 | 0 | 0.29 | 0.02 | 0 | 0 |
1101 | 0.17 | 0.08 | 0.07 | 0.32 | 0.01 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.01 | 0.33 | 0 | 0 |
1110 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
1111 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
[1] | KOCHER P C . Timing attacks on implementations of diffie-hellman,RSA,DSS,and other systems[A]. CRYPTO 1996[C]. Berlin: Springer, 1996. 104-113. |
[2] | KOCHER P C , JAFFE J , JUN B . Differential power analysis[A]. CRYPTO 1999[C]. Berlin: Springer, 1999. 388-397. |
[3] | QUISQUATER J , SAMYDE D . Electromagnetic analysis (EMA):measures and countermeasures for smart cards[A]. E-Smart 2001[C]. Berlin: Springer, 2001. 200-210. |
[4] | BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model[A]. CHES 2004[C]. Berlin: Springer, 2004. 16-29. |
[5] | CHARI S , RAO J R , ROHATGI P . Template attacks[A]. CHES 2002[C]. Berlin: Springer, 2002. 13-28. |
[6] | RECHBERGER C , OSWALD E . Practical template attacks[A]. WISA 2004[C]. Berlin: Springer, 2004. 440-456. |
[7] | MEDWED M , OSWALD E . Template attacks on ECDSA[A]. WISA 2008[C]. Berlin: Springer, 2008. 14-27. |
[18] | OLSSON U . Maximum likelihood estimation of the polychoric correlation coefficient[J]. Psychometrika, 1979,44(4): 443-460. |
[9] | WADDLE J , WAGNER D . Towards efficient second-order power analysis[A]. CHES 2004[C]. Berlin: Springer, 2004. 1-15. |
[10] | GEBOTYS C H , HO S , TIU C C . EM analysis of rijndael and ECC on a wireless java-based PDA[A]. CHES 2005[C]. Berlin: Springer, 2005. 250-264. |
[11] | GIERLICHS B , LEMKE-RUST K , PAAR C . Templates vs stochastic methods[A]. CHES 2006[C]. Berlin: Springer, 2006. 15-29. |
[12] | ARCHAMBEAU C , PEETERS E , STANDAERT F X , et al. Template attacks in principal subspaces[A]. CHES 2006[C]. Berlin: Springer, 2006. 1-14. |
[13] | VIDAL R , MA Y , SASTR Y . Generalized principal component analysis (GPCA)[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 2005,(27): 1945-1959. |
[14] | ZEITOUNI K . A survey of spatial data mining methods databases and statistics point of views[A]. IRMA[C]. Alaska,USA, 2000. 487-491. |
[15] | BOGDANOV A , KNUDSEN L R , LEANDER G , et al. PRESENT:an ultra-lightweight block cipher[A]. CHES 2007[C]. Berlin: Springer, 2007. 450-466. |
[16] | HONG D , SUNG J , HONG S . HIGHT:a new block cipher suitable for low-resource device[A]. CHES 2006[C]. Berlin: Springer, 2006. 46-59. |
[17] | GUO J , PEYRIN T , POSCHMANN A , et al. The LED block cipher[A]. CHES 2011[C]. Berlin: Springer, 2011. 326-341. |
[18] | 李玮, 谷大武, 赵辰 等. 物联网环境下LED轻量级密码算法的安全性分析[J]. 计算机学报, 2012,35(3):434-445. LI W , GU D W , ZHAO C , et al. Security analysis of the LED lightweight cipher in the internet of things[J]. Chinese Journal of Computers, 2012,35(3):434-445. |
[19] | JEONG K , CHANGHOON L . Differential fault analysis on block cipher LED-64[A]. DFIS 2012[C]. Berlin: Springer, 2012. 747-755. |
[20] | JOVANOVIC P , KREUZER M , POLIAN I . A fault attack on the LED block cipher[A]. Proceedings of COSADE 2012[C]. Berlin: Springer, 2012. 120-134. |
[21] | KREUZER M . Algebraic fault attacks webinar[EB/OL]. . |
[22] | ZHAO X J , GUO S Z , ZHANG F , et al. Improving and evaluating differential fault analysis on LED with algebraic techniques[A]. FDTC2013[C]. Santa Barbara,USA, 2013. 41-51. |
[23] | 冀可可, 王韬, 郭世泽 . 基于汉明重的 LED 代数旁路攻击研究[J]. 通信学报, 2010,31(12):82-89. JIN K K , WANG T , GUO S Z . Research of Hamming weight-based algebraic side-channel attack on LED[J]. Journal on Communications, 2010,31(12):82-89. |
[24] | 冀可可, 王韬, 赵新杰 等. 基于碰撞模型的 LED 代数旁路攻击[J]. 计算机应用研究, 2013,30(1):270-272. JIN K K , WANG T , ZHAO X J . Collision model-based algebraic sidechannel attack on LED[J]. Application Research of Computers, 2013,30(1):270-272. |
[25] | ZHANG L , ZHANG D . Finger-knuckle-print verification based on band-limited phase-only correlation[A]. Proceedings of the 13th International Conference on Computer Analysis of Images and Patterns[C]. Berlin: Springer, 2009. 141-148. |
[1] | Rongpeng LI, Bingyan WANG, Honggang ZHANG, Zhifeng ZHAO. Design of knowledge enhanced semantic communication receiver [J]. Journal on Communications, 2023, 44(6): 70-76. |
[2] | Shaoyu DU. Improved integral attack——random linear distinguish and key recovery attack [J]. Journal on Communications, 2023, 44(4): 145-153. |
[3] | Jingya YANG, Xiaogang TANG, Yiqing ZHOU, Ling LIU, Wang Jiangzhou. 6G native intelligence network architecture enabled by intent abstraction and knowledge [J]. Journal on Communications, 2023, 44(2): 12-26. |
[4] | Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG. Distributed anonymous authentication scheme based on the blockchain in VANET [J]. Journal on Communications, 2022, 43(9): 134-147. |
[5] | Zexi XU, Lei ZHUANG, Kunli ZHANG, Mingyu GUI. Online placement algorithm of service function chain based on knowledge graph [J]. Journal on Communications, 2022, 43(8): 41-51. |
[6] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[7] | Jingyu WANG, Zirui ZHUANG. Research on a knowledge-defined polymorphic network attainable service architecture [J]. Journal on Communications, 2022, 43(4): 71-82. |
[8] | Lian XIANG, Hongfeng PAN, Shulin JIN, Weidong SHAO. Research on inter-core crosstalk characteristics of real multi-core fibers with multi-core excitation [J]. Journal on Communications, 2022, 43(11): 233-241. |
[9] | Youheng DONG, Geng ZHAO, Yingjie MA. Two-dimensional pseudo-random coupled map lattices system based on partitioned elementary cellular automata and its dynamic properties [J]. Journal on Communications, 2022, 43(1): 71-82. |
[10] | Xiaoguang LI, Lei GONG, Xiaoli LI, Xin ZHANG, Ge YU. Learner preferences prediction with mixture embedding of knowledge and behavior graph [J]. Journal on Communications, 2021, 42(8): 130-138. |
[11] | Jiachen SUN, Jinlong WANG, Guoru DING, Jin CHEN, Yuping GONG. Spectrum knowledge graph: an intelligent engine facing future spectrum management [J]. Journal on Communications, 2021, 42(5): 1-12. |
[12] | Jinkang ZHU, Mingyang CHAI, Wuyang ZHOU. Three-three-three network architecture and learning optimization mechanism for B5G/6G [J]. Journal on Communications, 2021, 42(4): 62-75. |
[13] | Xiaojuan ZHAO, Yan JIA, Aiping LI, Kai CHEN. Research on link prediction model based on hierarchical attention mechanism [J]. Journal on Communications, 2021, 42(3): 36-44. |
[14] | Houzhen WANG, Xinwei CAI, Yan GUO, Huanguo ZHANG. 5-pass zero-knowledge identity authentication scheme based on matrix completion problem [J]. Journal on Communications, 2021, 42(11): 79-86. |
[15] | Shuo WANG, Yudong HUANG, Tao HUANG, Ru HUO, Yunjie LIU. Software-defined cross-domain scheduling mechanism for time-sensitive networking [J]. Journal on Communications, 2021, 42(10): 1-9. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|