基于模式识别的边信道攻击的诺贝尔键搜索方法

You-Seok Lee, YongJe Choi, Dong‐Guk Han, Ho-Yeon Kim, Hyoung-Nam Kim
{"title":"基于模式识别的边信道攻击的诺贝尔键搜索方法","authors":"You-Seok Lee, YongJe Choi, Dong‐Guk Han, Ho-Yeon Kim, Hyoung-Nam Kim","doi":"10.1109/ICASSP.2008.4517974","DOIUrl":null,"url":null,"abstract":"Differential power analysis (DPA) has been known as an efficient attack for finding secret keys of cryptosystems but its efficiency may be lowered due to the misalignment of the acquired signals. Though the misalignment problem has been now solvable by various successful approaches in DPA, a lot of power traces are still required to find correct keys. Since the required number of power traces is directly connected with the efficiency of SCAs, we propose a key-search method even with relatively reduced number of power traces based on recognizing special patterns of the signal caused by cryptographic operations. Experimental results show that the proposed method is able to search correct keys with much smaller number of traces than the minimum number of traces with which the conventional methods of the energy-based DPA and frequency-based DPA succeed in finding keys.","PeriodicalId":333742,"journal":{"name":"2008 IEEE International Conference on Acoustics, Speech and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A nobel key-search method for side channel attacks based on pattern recognition\",\"authors\":\"You-Seok Lee, YongJe Choi, Dong‐Guk Han, Ho-Yeon Kim, Hyoung-Nam Kim\",\"doi\":\"10.1109/ICASSP.2008.4517974\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Differential power analysis (DPA) has been known as an efficient attack for finding secret keys of cryptosystems but its efficiency may be lowered due to the misalignment of the acquired signals. Though the misalignment problem has been now solvable by various successful approaches in DPA, a lot of power traces are still required to find correct keys. Since the required number of power traces is directly connected with the efficiency of SCAs, we propose a key-search method even with relatively reduced number of power traces based on recognizing special patterns of the signal caused by cryptographic operations. Experimental results show that the proposed method is able to search correct keys with much smaller number of traces than the minimum number of traces with which the conventional methods of the energy-based DPA and frequency-based DPA succeed in finding keys.\",\"PeriodicalId\":333742,\"journal\":{\"name\":\"2008 IEEE International Conference on Acoustics, Speech and Signal Processing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-05-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE International Conference on Acoustics, Speech and Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASSP.2008.4517974\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Conference on Acoustics, Speech and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASSP.2008.4517974","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

差分功率分析(DPA)被认为是一种有效的密码系统密钥查找方法,但由于获取的信号不一致,其效率会降低。虽然在DPA中,失调问题已经通过各种成功的方法得到了解决,但仍然需要大量的电源走线来找到正确的键。由于所需的功率走线数量与sca的效率直接相关,因此我们提出了一种基于识别由密码操作引起的信号的特殊模式的密钥搜索方法,即使功率走线数量相对较少。实验结果表明,与传统的基于能量的DPA和基于频率的DPA的最小轨迹数相比,该方法能够以更少的轨迹数搜索到正确的密钥。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A nobel key-search method for side channel attacks based on pattern recognition
Differential power analysis (DPA) has been known as an efficient attack for finding secret keys of cryptosystems but its efficiency may be lowered due to the misalignment of the acquired signals. Though the misalignment problem has been now solvable by various successful approaches in DPA, a lot of power traces are still required to find correct keys. Since the required number of power traces is directly connected with the efficiency of SCAs, we propose a key-search method even with relatively reduced number of power traces based on recognizing special patterns of the signal caused by cryptographic operations. Experimental results show that the proposed method is able to search correct keys with much smaller number of traces than the minimum number of traces with which the conventional methods of the energy-based DPA and frequency-based DPA succeed in finding keys.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Rate-optimal MIMO transmission with mean and covariance feedback at low SNR Complexity adaptive H.264 encoding using multiple reference frames A low complexity selective mapping to reduce intercarrier interference in OFDM systems Learning to satisfy A message passing algorithm for active contours
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1