摘要
旁路功耗攻击的实施过程一般需要借助昂贵的设备和复杂的工作环境,因此其仿真软件成为研究者们分析攻击算法的首选工具.目前已经有多种旁路功耗攻击的软件仿真方法,但鲜有文章针对仿真软件的破解成功率进行相关研究.本文借助一阶DPA软件仿真方法成功破解了DES加密算法,同时针对其破解成功率进行了分析和实验验证.首先介绍了DPA攻击的基本原理和实现流程,并提出了本文实验的具体实现方法,对DES 16轮中8个S盒加密运算单独进行功耗采集,从而减少了S盒之间的相互影响.然后,针对功耗攻击成功率不高的问题,对第4个S盒内部加密运算的相关性进行了假设和仿真分析.最后,通过实验结果验证了仿真分析的正确性.
The implementation of side-channel attacks generally need to use expensive equipment and complex working environment,As a result,the simulation software has become the preferred tool for analyzing attack algorithm.There is a variety of simulation methods for side-channel attacks,but few articles have pay attention to the success rate of the power analysis attacks.In this paper,a standard DES encryption algorithm is cracked by the first-order DPA method and the success rate of the power analysis attacks is analyzed through theoretical and experimental method: Firstly,the basic principles and simulation process of DPA method is given,then our implementation of DPA is also proposed,in which the power of eight S-boxes in 16 encryption rounds is collected separately,thereby reducing attack simulation interaction between the S-box.Secondly,the hypothesis is made based on the detailed analysis of experimental data,that the correlation of encryption algorithms is existed in 4th S-boxes.Finally,the hypothesis is proved to be correct by lots of experiments.
出处
《漳州师范学院学报(自然科学版)》
2013年第2期36-42,共7页
Journal of ZhangZhou Teachers College(Natural Science)
基金
国家自然基金(61103246
61273290)
福建省教育厅项目(JB11185)