连续运行分组密码的VHDL实现中的功率攻击

A. Singh, S. Mishra
{"title":"连续运行分组密码的VHDL实现中的功率攻击","authors":"A. Singh, S. Mishra","doi":"10.1109/CICT48419.2019.9066205","DOIUrl":null,"url":null,"abstract":"The Correlation Power Analysis (CPA) is used to compromise the security of crypto systems by measuring and analyzing physical leakage that is the power consumption. Unlike classical cryptanalysis techniques, it requires very less computations to extract the secret information of the cipher systems. But, one of the main hindrances in mounting the CPA attack is the segregation of single power trace of multiple encryptions performed continuously (without pause) among number of traces corresponding to individual encryptions. To overcome this limitation, a new technique is proposed in this paper to split the power traces of AES and DES algorithms running continuously on FPGA. This (energy of samples based algorithm) finds the start of the encryption and computes number of samples in each clock of FPGA. It exploits the repetition of specific patterns available in the traces to determine the encryption length in terms of number of samples. With this information, it splits a power trace of several consecutive encryptions among number of traces corresponding to each encryption. The important thing is that it does not require information about clock frequency of FPGA board and sampling rate of the Oscilloscope. This algorithm was applied on the traces of 25, 50, 100, 125 and 250 samples per clock (when processing was performed at 1, 2 & 4 MHz clock frequencies). In all the cases, the key of AES and DES were retrieved by mounting the CPA attack on splitted traces resulting from the splitting technique.","PeriodicalId":234540,"journal":{"name":"2019 IEEE Conference on Information and Communication Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Power Attack on VHDL Implementation of Continuously Running Block Ciphers\",\"authors\":\"A. Singh, S. Mishra\",\"doi\":\"10.1109/CICT48419.2019.9066205\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Correlation Power Analysis (CPA) is used to compromise the security of crypto systems by measuring and analyzing physical leakage that is the power consumption. Unlike classical cryptanalysis techniques, it requires very less computations to extract the secret information of the cipher systems. But, one of the main hindrances in mounting the CPA attack is the segregation of single power trace of multiple encryptions performed continuously (without pause) among number of traces corresponding to individual encryptions. To overcome this limitation, a new technique is proposed in this paper to split the power traces of AES and DES algorithms running continuously on FPGA. This (energy of samples based algorithm) finds the start of the encryption and computes number of samples in each clock of FPGA. It exploits the repetition of specific patterns available in the traces to determine the encryption length in terms of number of samples. With this information, it splits a power trace of several consecutive encryptions among number of traces corresponding to each encryption. The important thing is that it does not require information about clock frequency of FPGA board and sampling rate of the Oscilloscope. This algorithm was applied on the traces of 25, 50, 100, 125 and 250 samples per clock (when processing was performed at 1, 2 & 4 MHz clock frequencies). In all the cases, the key of AES and DES were retrieved by mounting the CPA attack on splitted traces resulting from the splitting technique.\",\"PeriodicalId\":234540,\"journal\":{\"name\":\"2019 IEEE Conference on Information and Communication Technology\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE Conference on Information and Communication Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CICT48419.2019.9066205\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Conference on Information and Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICT48419.2019.9066205","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

相关功率分析(CPA)通过测量和分析物理泄漏(即功耗)来破坏加密系统的安全性。与传统的密码分析技术不同,它只需要很少的计算量就可以提取密码系统的秘密信息。但是,安装CPA攻击的主要障碍之一是在与单个加密对应的多个跟踪中,连续(不暂停)执行多个加密的单个功率跟踪是隔离的。为了克服这一限制,本文提出了一种在FPGA上连续运行的AES和DES算法的功率走线分离的新技术。该算法(基于采样能量的算法)找到加密的起始点并计算FPGA每个时钟的采样数。它利用跟踪中可用的特定模式的重复来确定以样本数量表示的加密长度。利用这些信息,它将几个连续加密的功率跟踪拆分为与每个加密相对应的多个跟踪。重要的是,它不需要FPGA板的时钟频率和示波器的采样率的信息。该算法应用于每个时钟25、50、100、125和250个样本的轨迹(当在1、2和4 MHz时钟频率下进行处理时)。在所有情况下,AES和DES的密钥都是通过对分裂技术产生的分裂痕迹进行CPA攻击来获取的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Power Attack on VHDL Implementation of Continuously Running Block Ciphers
The Correlation Power Analysis (CPA) is used to compromise the security of crypto systems by measuring and analyzing physical leakage that is the power consumption. Unlike classical cryptanalysis techniques, it requires very less computations to extract the secret information of the cipher systems. But, one of the main hindrances in mounting the CPA attack is the segregation of single power trace of multiple encryptions performed continuously (without pause) among number of traces corresponding to individual encryptions. To overcome this limitation, a new technique is proposed in this paper to split the power traces of AES and DES algorithms running continuously on FPGA. This (energy of samples based algorithm) finds the start of the encryption and computes number of samples in each clock of FPGA. It exploits the repetition of specific patterns available in the traces to determine the encryption length in terms of number of samples. With this information, it splits a power trace of several consecutive encryptions among number of traces corresponding to each encryption. The important thing is that it does not require information about clock frequency of FPGA board and sampling rate of the Oscilloscope. This algorithm was applied on the traces of 25, 50, 100, 125 and 250 samples per clock (when processing was performed at 1, 2 & 4 MHz clock frequencies). In all the cases, the key of AES and DES were retrieved by mounting the CPA attack on splitted traces resulting from the splitting technique.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信