张洪欣, 李静, 张帆, 甘罕, 贺鹏飞. 基于能耗旁路泄露的密码芯片模板攻击算法研究[J]. 电波科学学报, 2015, 30(5): 987-992. doi: 10.13443/j.cjors.2014102105
      引用本文: 张洪欣, 李静, 张帆, 甘罕, 贺鹏飞. 基于能耗旁路泄露的密码芯片模板攻击算法研究[J]. 电波科学学报, 2015, 30(5): 987-992. doi: 10.13443/j.cjors.2014102105
      ZHANG Hongxin, LI Jing, ZHANG Fan, GAN Han, HE Pengfei. A study on template attack of chip base on side channel power leakage[J]. CHINESE JOURNAL OF RADIO SCIENCE, 2015, 30(5): 987-992. doi: 10.13443/j.cjors.2014102105
      Citation: ZHANG Hongxin, LI Jing, ZHANG Fan, GAN Han, HE Pengfei. A study on template attack of chip base on side channel power leakage[J]. CHINESE JOURNAL OF RADIO SCIENCE, 2015, 30(5): 987-992. doi: 10.13443/j.cjors.2014102105

      基于能耗旁路泄露的密码芯片模板攻击算法研究

      A study on template attack of chip base on side channel power leakage

      • 摘要: 为解决模板攻击对先验知识要求较为苛刻的问题, 基于聚类的半监督式模板攻击方法, 研究了能耗泄露曲线特征点的选择, 提出了基于皮尔逊相关系数和主成分分析(Principal Component Analysis, PCA)方法对旁路泄露进行特征提取的方法.在聚类过程中, 通过少量的有标号的信息来辅助并引导聚类过程对无标号数据的聚类处理, 放宽了模板攻击的假设条件.以轻量级分组密码(Light Encryption Device, LED)算法旁路泄露为例, 通过实验研究了特征选取等因素对密钥恢复的影响, 并分析了能量迹中的数据依赖性.研究结果表明:与常规半监督式模板攻击方法相比, 所采用的特征提取方法可以有效降低异常数据和噪声的干扰, 提高先验信息的利用率及密钥恢复成功率.

         

        Abstract: To meet the rigid requirements of prior knowledge in template attack, a semi-supervised template attack method based on clustering is investigated, where the selection of power trace feature points is studied, and a feature selection method based on Pearson correlation coefficient and principal component analysis is put forword.In the process of clustering, the assumption of template attack is relaxed through clustering for unmarked data under the guidance of a certain marked information.The effect of factors such as feature selection is studied in a test based on LED encryption, and at the same time, the data dependence on power traces is analyzed.Compared to the traditional semi-supervised template attack method, the result shows that this feature selection method can effectively reduce the effect of the abnormal data and noise, and improve the utilization of the prior information and success rate of key recovery.

         

      /

      返回文章
      返回