【24h】

Differential Power Analysis on Block Cipher ARIA

机译:分组密码ARIA的差分功率分析

获取原文
获取原文并翻译 | 示例

摘要

ARIA is a 128-bit symmetric block cipher having 128-bit, 192-bit, or 256-bit key lengths. The cipher is a substitution-permutation encryption network (SPN) that uses an involutional binary matrix. This paper shows that a careless implementation of ARIA on smartcards is vulnerable to a differential power analysis attack. This attack is realistic because we can measure power consumption signals at two kinds of S-boxes and two types of substitution layers. By analyzing the power traces, we can find all round keys and also extract a master key from only two round keys using circular rotation, XOR, and involutional operations for two types of layers.
机译:ARIA是具有128位,192位或256位密钥长度的128位对称块密码。密码是使用对合二进制矩阵的置换置换加密网络(SPN)。本文表明,在智能卡上不小心实施ARIA容易受到差分功耗分析攻击。这种攻击是现实的,因为我们可以在两种S-box和两种类型的替换层上测量功耗信号。通过分析功率迹线,我们可以找到所有圆形密钥,并且还可以使用两种类型的图层的循环旋转,XOR和累加运算从两个圆形密钥中提取主密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号