首页> 美国卫生研究院文献>The Scientific World Journal >Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
【2h】

Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

机译:利用掩膜中的小泄漏将二阶攻击转变为一阶攻击并利用线性代码陪集改进旋转替换盒掩蔽

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.
机译:事实证明,用来阻止边信道攻击的掩蔽对策很容易遭受掩膜抽取攻击。针对高级加密标准(AES)算法的最新掩码提取攻击针对的是S-Box重新计算方案,但尚未应用于S-Box是脱机预先计算的方案。我们提出了一种针对存储在非易失性存储器中的预先计算的S-Box的攻击。我们的攻击目标是在受低熵屏蔽方案保护的软件中实施的AES,并以91%的成功率恢复屏蔽。与传统的二阶攻击相比,恢复秘密密钥所需的功率迹线更少(实际上至少需要两个数量级)。此外,我们表明,这种攻击在嘈杂的环境中或泄漏点数量减少的情况下仍然可行。最终,我们指定了一种方法,可以通过选择合适的掩码集陪集来增强对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号