首页 | 本学科首页   官方微博 | 高级检索  
     

基于时间序列分析的侧信道攻击
引用本文:赵建波,王敏,习伟,吴震,杜之波,王燚,兰天.基于时间序列分析的侧信道攻击[J].南方电网技术,2020,14(1):10-17.
作者姓名:赵建波  王敏  习伟  吴震  杜之波  王燚  兰天
作者单位:成都信息工程大学网络空间安全学院,成都,610225;南方电网科学研究院,广州,510663;华大半导体有限公司,上海,200120
摘    要:密码设备在进行加解密时会产生大量的物理信息,如电磁、能耗、热量等。攻击者利用这些物理信息对密码设备进行侧信道攻击,窃取密码设备的密钥。就传统的椭圆曲线加密算法简单能量分析攻击而言,攻击者通过人工识别倍点计算能耗数据中的相似模块,从而恢复出密钥。这种攻击方式导致攻击效率低,准确率不高。本文基于时间序列的模体发现提出了SPAMD算法,该算法实现了倍点计算的能耗数据中相似模块的自动识别,完成了攻击方式从人工识别到自动识别的转换。实验结果表明SPAMD攻击在效率和准确率上有了显著的提升。

关 键 词:侧信道攻击  简单能量分析攻击  倍点计算  模体发现

Side Channel Attack Based on Time Series Analysis
ZHAO Jianbo,WANG Min,XI Wei,WU Zhen,DU Zhibo,WANG Yi,LAN Tian.Side Channel Attack Based on Time Series Analysis[J].Southern Power System Technology,2020,14(1):10-17.
Authors:ZHAO Jianbo  WANG Min  XI Wei  WU Zhen  DU Zhibo  WANG Yi  LAN Tian
Affiliation:(School of Cybersecurity,Chengdu University of Information Technology,Chengdu 610225,China;Electrical Power Research Institute,CSG,Guangzhou 510663,China;Huada Semiconductor Co.,Ltd.,Shanghai 200120,China)
Abstract:The cryptographic device generates a large amount of physical information such as electromagnetic,energy consumption,heat,etc.during encryption and decryption.The attackers use these physical information to perform a side channel attack on the cryptographic device and steal the key of the cryptographic device.In the case of a traditional simple power analysis attack of elliptic curve cryptography algorithm,the attacker recovers the key by manually identifying similar modules in the power consumption data of the double point calculation.But this way results in low attack efficiency and low attack accuracy.This paper proposes the SPAMD algorithm based on the time series of motif discovery.The algorithm realizes the automatic recognition of similar modules in the power consumption data of the double point calculation,and completes the conversion of the attack mode from manual recognition to automatic recognition.Experiment results show that SPAMD attacks have a significant improvement in efficiency and accuracy.
Keywords:side channel attack  simple power analysis attack  double point calculation  motif discovery
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号