A novel bit scalable leakage model based on genetic algorithm

Zhenbin Zhang, Liji Wu*, An Wang, Zhaoli Mu, Xiangmin Zhang

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

17 引用 (Scopus)

摘要

With the growing popularity of smart integrated circuit (IC) cards, the chip security is attracting more and more attention. Researches on the attack and protection of smart IC cards have become increasingly hot. Side-channel attack is the practical and effective method, which has brought enormous threat. The efficiency of attack depends on the extent of the leakage model, which characterizes the practical applications. In the power analysis attack, the classical leakage model usually exploits the power consumption of single S-box, which is called divide and conquer. Taking data encryption standard (DES) algorithm, for example, the attack on each S-box needs to search the key space of 26 in a brute-force way. In this paper, we propose a novel leakage model, which is more flexible than the classical leakage model. The novel leakage model is based on the power consumption of multiple S-boxes, and the implementation of this method is combined with genetic algorithm. We can establish leakage model based on the Hamming distance of round output generated by eight S-boxes in DES algorithm. The experiment verifies the fact that the leakage model of eight S-boxes can decrease the traces number up to 52% than the classical one based on single S-box for DES algorithm. It also decreases the traces number up to 32% for SM4 algorithm. All the measurements of power data are acquired from a practical smart IC card. We also conclude that increasing noise, using variable clock, and limiting the lifetime of root key can be the choices of defensive strategy.

源语言英语
页(从-至)3896-3905
页数10
期刊Security and Communication Networks
8
18
DOI
出版状态已出版 - 1 12月 2015
已对外发布

指纹

探究 'A novel bit scalable leakage model based on genetic algorithm' 的科研主题。它们共同构成独一无二的指纹。

引用此