中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 期刊论文
Subject: Computer Science
Title:
polar differential power attacks and evaluation
Author: Tang Ming ; Qiu ZhenLong ; Gao Si ; Yi Mu ; Liu ShuBo ; Zhang HuanGuo ; Jin YingZhen
Keyword: computer security ; differential power attack ; side channel attack
Source: SCIENCE CHINA-INFORMATION SCIENCES
Issued Date: 2012
Volume: 55, Issue:7, Pages:1588-1604
Indexed Type: SCI
Department: Tang Ming; Qiu ZhenLong; Gao Si; Liu ShuBo; Zhang HuanGuo; Jin YingZhen Wuhan Univ Sch Comp Sci Wuhan 430072 Peoples R China. Gao Si Chinese Acad Sci State Key Lab Informat Secur Inst Software Beijing 100190 Peoples R China. Yi Mu Univ Wollongong Ctr Comp & Informat Secur Res Sch Comp Sci & Software Engn Wollongong NSW 2522 Australia.
Sponsorship: National Natural Science Foundation of China 60970116, 60970115, 90718006, 61003267
Abstract: Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system security. The existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implementation adopted in the target; therefore, they are not fully suitable for practical applications. In this paper, we propose a novel SCA-polar differential power attack (polar DPA). We found that DPA peaks have different biases for different cryptographic algorithms and implementations. Based on these biases, we can successfully attack a block cipher, assuming that the cipher algorithm uses a secret key in its first round, without the knowledge of the cipher algorithm or implementation. Other rounds can be treated as a black box. We present a detailed theoretical analysis and experiment to demonstrate the correctness and efficiency of our scheme. Furthermore, our scheme has demonstrated an improvement over the leakage evaluation scheme due to Ichikawa et al. (CHES 2005). Our evaluation method can be used in electronic design automatic (EDA) flows and can help security circuit designers to understand the data leakage due to SCAs.
English Abstract: Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system security. The existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implementation adopted in the target; therefore, they are not fully suitable for practical applications. In this paper, we propose a novel SCA-polar differential power attack (polar DPA). We found that DPA peaks have different biases for different cryptographic algorithms and implementations. Based on these biases, we can successfully attack a block cipher, assuming that the cipher algorithm uses a secret key in its first round, without the knowledge of the cipher algorithm or implementation. Other rounds can be treated as a black box. We present a detailed theoretical analysis and experiment to demonstrate the correctness and efficiency of our scheme. Furthermore, our scheme has demonstrated an improvement over the leakage evaluation scheme due to Ichikawa et al. (CHES 2005). Our evaluation method can be used in electronic design automatic (EDA) flows and can help security circuit designers to understand the data leakage due to SCAs.
Language: 英语
WOS ID: WOS:000305330600010
Citation statistics:
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/15070
Appears in Collections:软件所图书馆_期刊论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Tang Ming,Qiu ZhenLong,Gao Si,et al. polar differential power attacks and evaluation[J]. SCIENCE CHINA-INFORMATION SCIENCES,2012-01-01,55(7):1588-1604.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Tang Ming]'s Articles
[Qiu ZhenLong]'s Articles
[Gao Si]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Tang Ming]‘s Articles
[Qiu ZhenLong]‘s Articles
[Gao Si]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace