{"title":"针对DPA攻击的有效随机数掩蔽方法","authors":"M. Yoshikawa, Y. Kojima","doi":"10.1109/ICSEng.2011.63","DOIUrl":null,"url":null,"abstract":"Security LSI which is implemented on IC cards conducts the encryption processing to protect confidential information such as cipher keys. In the encryption, encryption standards such as DES algorithm and AES algorithm are widely used and are theoretically secured. However, when these encryption standards are incorporated into electronic devices, it is reported to be possible to estimate the confidential information by analyzing the secondary information such as power consumption during the circuit's operation. The transformed masking method is a typical measure against this attack at the algorithm level. In this method, adding random numbers to intermediate data of encryption masks the correlation between power consumption and confidential information. The transformed masking method is effective for hamming weight attack that focuses on the bit value. This study clarifies random numbers used in the transformed masking method that are effective for this attack. Experimental results show the validity of the proposed method.","PeriodicalId":387483,"journal":{"name":"2011 21st International Conference on Systems Engineering","volume":"229 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Efficient Random Number for the Masking Method against DPA Attacks\",\"authors\":\"M. Yoshikawa, Y. Kojima\",\"doi\":\"10.1109/ICSEng.2011.63\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security LSI which is implemented on IC cards conducts the encryption processing to protect confidential information such as cipher keys. In the encryption, encryption standards such as DES algorithm and AES algorithm are widely used and are theoretically secured. However, when these encryption standards are incorporated into electronic devices, it is reported to be possible to estimate the confidential information by analyzing the secondary information such as power consumption during the circuit's operation. The transformed masking method is a typical measure against this attack at the algorithm level. In this method, adding random numbers to intermediate data of encryption masks the correlation between power consumption and confidential information. The transformed masking method is effective for hamming weight attack that focuses on the bit value. This study clarifies random numbers used in the transformed masking method that are effective for this attack. Experimental results show the validity of the proposed method.\",\"PeriodicalId\":387483,\"journal\":{\"name\":\"2011 21st International Conference on Systems Engineering\",\"volume\":\"229 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-08-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 21st International Conference on Systems Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSEng.2011.63\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 21st International Conference on Systems Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSEng.2011.63","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Efficient Random Number for the Masking Method against DPA Attacks
Security LSI which is implemented on IC cards conducts the encryption processing to protect confidential information such as cipher keys. In the encryption, encryption standards such as DES algorithm and AES algorithm are widely used and are theoretically secured. However, when these encryption standards are incorporated into electronic devices, it is reported to be possible to estimate the confidential information by analyzing the secondary information such as power consumption during the circuit's operation. The transformed masking method is a typical measure against this attack at the algorithm level. In this method, adding random numbers to intermediate data of encryption masks the correlation between power consumption and confidential information. The transformed masking method is effective for hamming weight attack that focuses on the bit value. This study clarifies random numbers used in the transformed masking method that are effective for this attack. Experimental results show the validity of the proposed method.