论文部分内容阅读
AES算法已经被广泛的应用于商业密码领域,未加防护的AES算法可被DPA攻击.掩码是一种有效的抗DPA攻击防护措施,尤其是采用全掩码技术后,常规DPA无法对其成功实施攻击.本文提出了一种选择明文和二阶DPA的组合攻击方法(CSDCA),可成功实施对全掩码AES电路的侧信道攻击.首先利用选择明文的方式降低密钥遍历的空间,由128比特降至每8比特分组进行攻击;同时,选择初始轮的轮输出和第一轮的轮输出作为中间值,采用二阶DPA技术,去除掩码防护,从而成功攻击掩码防护.实验结果表明:对于采用SASEBO板仿真实现的全掩码AES算法,应用CSDCA方法后,采集6万条曲线一小时即可获得密钥.相比于传统的二阶DPA攻击,本方法攻击成功所需的曲线条数(攻击所需时间)可降低94%(由100万条降低至6万条);该方法与业界常用方法(毛刺DPA攻击)相比,曲线条数(攻击时间)可降低79%(由28万条降低至6万条).
AES algorithm has been widely used in the field of commercial cryptography, unprotected AES algorithm can be DPA attack.Mask is an effective anti-DPA attack protection measures, especially with the full mask technology, conventional DPA can not be its The successful implementation of the attack.This paper presents a combination of plaintext and second-order DPA attack (CSDCA), the successful implementation of full-mask AES circuit side-channel attacks.First, the choice of plaintext to reduce key traversal space, From 128 bits to 8 bits per packet attack; the same time, select the first round of wheel output and the first round of wheel output as the intermediate value, the use of second-order DPA technology to remove mask protection, and thus successfully attack mask protection. The results show that for the full-mask AES algorithm using SASEBO board emulation, the CSDCA method is applied to acquire 60,000 curves for one hour to obtain the key.Compared with the traditional second-order DPA attack, the method successfully attacks the required (The attack time) can be reduced by 94% (from 1 million to 60,000); the number of curves (attack time) can be reduced by 79 compared with the commonly used method in the industry (burr DPA attack) % (From 280,000 to 60,000 ).