期刊文献+

基于Alexnet卷积神经网络的加密芯片模板攻击新方法 被引量:2

A New Template Attack Method for Encryption Chip Based on Alexnet Convolutional Neural Network
下载PDF
导出
摘要 针对经典高斯模板攻击存在的问题,在分析了卷积神经网络方法具有的优势的基础上,提出了一种基于卷积神经网络的加密芯片旁路模板攻击新方法;该方法可以有效地处理高维数据,且可以通过不断地调整网络权值与偏置实现对数据无限逼近,明确分类的精确关系,提高模板刻画精度;最后选取AT89C52微控制器(单片机)运行的AES加密算法第一轮异或操作为攻击点,与传统的模板攻击进行了对比实验,实验结果表明:虽然在匹配成功率方面稍低于传统的模板攻击,模型结构和超参数仍需要进一步优化,但新方法在处理高维特征点方面较传统的模板攻击具有较大优势。 Aiming at the problems of classical Gauss template attacks,based on the analysis of the advantages of convolutional neural network,a new method based on convolution neural network for encrypting chip side-channel template attack is proposed.This method can deal with high-dimensional data effectively,and it can achieve infinite approximation of data by adjusting weights and biases constantly,and clarify the precise relationship between classifications,and improve the accuracy of template characterization.Selects the AT89C52 microcontroller(MCU)running AES encryption algorithm first round XOR operation is the point of attack,compared with traditional template attacks.Experimental results show that although the success rate of matching is slightly lower than that of traditional template attacks,the model structure and hyperparameter still need to be further optimized.However,the new method has greater advantages in dealing with high-dimensional feature points than traditional template attacks.
作者 郭东昕 陈开颜 张阳 胡晓阳 魏延海 Guo Dongxin;Chen Kaiyan;Zhang Yang;Hu Xiaoyang;Wei Yanhai(Shijiazhuang Campus,Army Engineering University,Shijiazhuang 050003,China)
出处 《计算机测量与控制》 2018年第10期246-249,254,共5页 Computer Measurement &Control
基金 国家自然科学基金资助项目(51377170) 国家青年科学基金资助项目(61602505)
关键词 加密芯片 卷积神经网络 模板分析 高级加密标准 encryption chip convolutional neural network template analysis advanced encryption standard
  • 相关文献

参考文献3

二级参考文献42

  • 1韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 2韩军,曾晓洋,汤庭鳌.基于时间随机化的密码芯片防攻击方法[J].计算机工程,2007,33(2):6-8. 被引量:8
  • 3Quisquater J J, Samyde D. Electromagnetic analysis (EMA): Measures and countermeasures for smart cards// Proceedings of the Smart Cards Programming and Security (e-Smart 2001). Cannes, France, 2001: 200-210 被引量:1
  • 4Gandolfi K, Mourtel C, Olivier F. Electromagnetic analysis: Concrete results//Proceedings of the Workshop on Crypto graphic Hardware and Embedded Systems (CHES'01). Paris, France, 2001:251-261 被引量:1
  • 5Agrawal D, Archambeault B, Rao J R, Rohatgi P. The EM side channel(s): Attacks and assessment methodologies// Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'02). Redwood Shores, CA, USA, 2002:29-45 被引量:1
  • 6Chari S, Rao J R, Rohatgi P. Template attacks//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES' 03). Cologne, Germany, 2003 13-28 被引量:1
  • 7Agrawal D, Rao J R, Rohatgi P, Schramm K. Templates as master keys//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES' 05). Edinburgh, UK, 2005: 15-29 被引量:1
  • 8Archambeau C, Peeters E, Standaert F X, Quisquater J J. Template attacks in principal subspaces//Proeeedings of the Workshop on Cryptographie Hardware and Embedded Systems (CHES'06). Yokohama, Japan, 2006, 1-14 被引量:1
  • 9Gierlichs B, Lemke-Rust K, Paar C. Templates vs. Stochastic Methods//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'06). Yokohama, Japan, 2006: 15-29 被引量:1
  • 10Standaert Francois-Xavier, Archambeau Cedric. Using subspace-based template attacks to compare and combine power and electromagnetic information leakages//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'08). Washington, D.C., USA, 2008: 411- 425 被引量:1

共引文献622

同被引文献11

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部