首页> 中文期刊> 《物理学报》 >基于Hamming weight和泄漏光子数的高级加密标准密码芯片光辐射分析攻击∗

基于Hamming weight和泄漏光子数的高级加密标准密码芯片光辐射分析攻击∗

         

摘要

The security of information transmission is of paramount importance in all sectors of society, whether civilian or defence related. In ancient times the encryption of secret messages was mainly realized by physical or chemical means, but this was later supplemented by mathematical techniques. In parallel, the breaking of enemy codes has also been a subject of intense study. To date, the only known absolutely secure means of encryption is through quantum cryp-tography. However, this still has to be implemented by equipment that is vulnerable to various physical attacks, so it is important to study these methods of attack, both for legitimate users and for the surveillance of criminal activities. Today, nearly all transactions have to be realized through the computer and much effort has been devoted to cracking the software. However, little attention has been paid to the hardware, and it has only recently been realized that computer chips themselves can leak sensitive information, from which a code may even be deciphered. By studying the photonic emission and the data dependency of a cryptographic chip during operation, the corre-spondence between the Hamming weight of the operand and the number of photons emitted may be established, based on which a simple and effective method is proposed to crack the Advanced Encryption Standard (AES) cipher chip. An experimental platform has been set up for measuring and analyzing the leaked photonic emission using time-correlated single-photon counting. An AT89C52 microcontroller implementing the operation of the AES cipher algorithm is used as a cipher chip. The emitted photons are collected when the first AddRoundKey and SubBytes of the AES encryption arithmetic are executed, and their respective numbers are found to have a linear relationship with the operand Hamming weight. The sources of noise affecting the photon emission trace have been analyzed, so that the measurement error and uncertainty can be reduced effectively. With the help of our Hamming weight simulation model, by selecting one or several groups of plain text and comparing the corresponding relationship between the Hamming weight of the interme-diate values and the number of photons emitted by the cipher chip, the key of the AES encryption algorithm has been successfully recovered and cracked. This confirms the effectiveness of this method of attack, which can therefore pose a severe threat to the security of the AES cipher chip. For the next step in the future, our method will be optimized to narrow the search range, and also combined with other photonic emission analysis attacks (such as simple photonic emission analysis and differential photonic emission analysis) to improve the efficiency. A comparison and evaluation of the various methods will be made. At the same time, our current experimental configuration will be improved to obtain a better collection efficiency and signal-to-noise ratio.

著录项

相似文献

  • 中文文献
  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号