针对DPA攻击的有效随机数掩蔽方法

M. Yoshikawa, Y. Kojima
{"title":"针对DPA攻击的有效随机数掩蔽方法","authors":"M. Yoshikawa, Y. Kojima","doi":"10.1109/ICSEng.2011.63","DOIUrl":null,"url":null,"abstract":"Security LSI which is implemented on IC cards conducts the encryption processing to protect confidential information such as cipher keys. In the encryption, encryption standards such as DES algorithm and AES algorithm are widely used and are theoretically secured. However, when these encryption standards are incorporated into electronic devices, it is reported to be possible to estimate the confidential information by analyzing the secondary information such as power consumption during the circuit's operation. The transformed masking method is a typical measure against this attack at the algorithm level. In this method, adding random numbers to intermediate data of encryption masks the correlation between power consumption and confidential information. The transformed masking method is effective for hamming weight attack that focuses on the bit value. This study clarifies random numbers used in the transformed masking method that are effective for this attack. Experimental results show the validity of the proposed method.","PeriodicalId":387483,"journal":{"name":"2011 21st International Conference on Systems Engineering","volume":"229 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Efficient Random Number for the Masking Method against DPA Attacks\",\"authors\":\"M. Yoshikawa, Y. Kojima\",\"doi\":\"10.1109/ICSEng.2011.63\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security LSI which is implemented on IC cards conducts the encryption processing to protect confidential information such as cipher keys. In the encryption, encryption standards such as DES algorithm and AES algorithm are widely used and are theoretically secured. However, when these encryption standards are incorporated into electronic devices, it is reported to be possible to estimate the confidential information by analyzing the secondary information such as power consumption during the circuit's operation. The transformed masking method is a typical measure against this attack at the algorithm level. In this method, adding random numbers to intermediate data of encryption masks the correlation between power consumption and confidential information. The transformed masking method is effective for hamming weight attack that focuses on the bit value. This study clarifies random numbers used in the transformed masking method that are effective for this attack. Experimental results show the validity of the proposed method.\",\"PeriodicalId\":387483,\"journal\":{\"name\":\"2011 21st International Conference on Systems Engineering\",\"volume\":\"229 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-08-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 21st International Conference on Systems Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSEng.2011.63\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 21st International Conference on Systems Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSEng.2011.63","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

安全LSI是在IC卡上实现的加密处理,以保护密钥等机密信息。在加密中,广泛使用DES算法、AES算法等加密标准,理论上是安全的。然而,当这些加密标准被纳入电子设备时,据报道,可以通过分析电路运行期间的功耗等次要信息来估计机密信息。在算法层面上,变换掩蔽方法是对抗这种攻击的典型措施。该方法通过在加密中间数据中加入随机数来掩盖功耗与机密信息之间的相关性。变换掩蔽法可以有效地对付以位值为中心的汉明权重攻击。本研究阐明了变换掩蔽方法中使用的随机数对这种攻击有效。实验结果表明了该方法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Efficient Random Number for the Masking Method against DPA Attacks
Security LSI which is implemented on IC cards conducts the encryption processing to protect confidential information such as cipher keys. In the encryption, encryption standards such as DES algorithm and AES algorithm are widely used and are theoretically secured. However, when these encryption standards are incorporated into electronic devices, it is reported to be possible to estimate the confidential information by analyzing the secondary information such as power consumption during the circuit's operation. The transformed masking method is a typical measure against this attack at the algorithm level. In this method, adding random numbers to intermediate data of encryption masks the correlation between power consumption and confidential information. The transformed masking method is effective for hamming weight attack that focuses on the bit value. This study clarifies random numbers used in the transformed masking method that are effective for this attack. Experimental results show the validity of the proposed method.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信