西安邮电大学无线网络安全技术国家工程实验室;
提出一种基于支持向量机(Support Vector Machine, SVM)的侧信道碰撞攻击方法,用于对带重用掩码的高级加密标准(Advanced Encryption Standard, AES)算法进行碰撞检测和密钥恢复。在Chipwhisperer平台上采集带重用掩码防护的AES的能量迹,利用能量迹方差粗略得到各个S盒相关的最多兴趣点。将某两个S盒的兴趣点取差值后进行归一化处理得到对应的训练数据集,并利用基于三次多项式核函数的支持向量机进行训练得到分类器。在测试阶段,利用分类器给出是否碰撞的分值,判断碰撞和非碰撞两种情形。实验结果表明,在不同噪声环境下所提方法均能以更少的能量迹实现90%以上的攻击成功率,从而有效地检测碰撞。
17 | 0 | 19 |
下载次数 | 被引频次 | 阅读次数 |
[2] KOCHER P,JAFFE J,JUN B.Differential power analysis[C]//19th Annual International Cryptology Conference.Berlin:Springer,1999:388-397.
[3] BRIER E,CLAVIER C,OLIVIER F.Correlation power analysis with a leakage model[C]//International Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2004:16-29.
[4] CHARI S,RAO J R,ROHATGI P.Tem-plateattacks[C]//Cryptographic Hardware and Embedded Systems-CHES 2002:4th International Workshop.[S.l.]:Springer,2003:13-28.
[5] PEETERS E,STANDAERT F X,QUISQUATER J J.Power and electromagnetic analysis:Improved model,consequences and comparisons[J].Integration,2007,40(1):52-60.
[6] GENKIN D,SHAMIR A,TROMER E.RSA key extraction via low-bandwidth acoustic cryptanalysis[M].Berlin:Springer Berlin Heidelberg,2014:444-461.
[7] LI Y,SAKIYAMA K,GOMISAWA S,et al.Fault sensitivity analysis[C]//Cryptogra-phic Hardware and Embedded Systems,CHES 2010:12th International Workshop.[S.l.]:Springer,2010:320-334.
[8] WANG Q,WANG A,WU L J,et al.A new zero value attack combined fault sensitivity analysis on masked AES[J].Microprocessors and Microsystems,2016,45:355-362.
[9] WANG Q,WANG A,QU G,et al.New methods of template attack based on fault sensitivity analysis[J].IEEE Transactions on Multi-Scale Computing Systems,2017,3(2):113-123.
[10] SCHRAMM K,WOLLINGER T,PAAR C.A new class of collision attacks and its application to DES[C]//International Workshop on Fast Software Encryption.Berlin:Springer,2003:206-222.
[11] JOYE M,PAILLIER P,SCHOENMAKERS B.On second-order differential power analysis[M].Berlin:Springer Berlin Heidelberg,2005:293-308.
[12] OSWALD E,MANGARD S,HERBST C,et al.Practical second-order DPA attacks for masked smart card implementations of block ciphers[C]//Topics in Cryptology-CT-RSA 2006:The Cryptographers’ Track at the RSA Conference 2006.Berlin:Springer,2006:192-207.
[13] SCHRAMM K,LEANDER G,FELKE P,et al.A collision-attack on AES:Combining side channel-and differential-attack[C]//Cryptographic Hardware and Embedded Systems-CHES 2004:6th International Wor-kshop Cambridge.Berlin:Springer,2004:163-175.
[14] WANG A,WANG Z Y,ZHENG X X,et al.Efficient collision attacks on smart card implementations of masked AES[J].Science China Information Sciences,2015,58(5):1-15.
[15] DING Y L,SHI Y,WANG A,et al.Adaptive chosen-plaintext collision attack on masked AES in edge computing[J].IEEE Access,2019,7:63217-63229.
[16] ZHENG D,JIA X,ZHANG M L.Hypothe-sis testing based side-channel collision analysis[J].IEEE Access,2019,7:104218-104227.
[17] GAO F,MAO B L,WU L J,et al.Leveraging ensemble learning for side channel analysis on masked AES[C]//2021 7th International Conference on Computer and Communications (ICCC).Chengdu:IEEE,2021:267-271.
[18] WU L C,PERIN G,PICEK S.I choose you:Automated hyperparameter tuning for deep learning-based side-channel analysis[J].IEEE Transactions on Emerging Topics in Computing,2024,12(2):546-557.
[19] 顾佳鑫,贺兴时,刘青.改进的布谷鸟搜索算法对支持向量机参数优化[J].西安工程大学学报,2022,36(2):110-118.GU J X,HE X S,LIU Q.Parameter optimization of support vector machine based on improved cuckoo search algorithm[J].Journal of Xi’an Polytechnic University,2022,36(2):110-118.(in Chinese)
[20] CLAVIER C,FEIX B,GAGNEROT G,et al.Improved collision-correlation power analysis on first order protected AES[C]//International Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2011:49-62.
[21] MANGARD S,OSWALD E,POPP T.Statistical characteristics of power traces[M].Power Analysis Attacks.Boston:Springer,2007:61-99.
[22] BOGDANOV A,KIZHVATOV I.Beyondthe limits of DPA:Combined side-channel collision attacks[J].IEEE Transactions on Computers,2012,61(8):1153-1164.
基本信息:
DOI:10.13682/j.issn.2095-6533.2024.06.010
中图分类号:TP181;TN918.4
引用信息:
[1]张美玲,袁旭鑫,郑东.一种基于支持向量机的侧信道碰撞攻击方法[J].西安邮电大学学报,2024,29(06):73-78.DOI:10.13682/j.issn.2095-6533.2024.06.010.
基金信息:
国家自然科学基金项目(62072371); 陕西省重点研发计划项目(2021ZDLGY06-04)