跳到主要导航 跳到搜索 跳到主要内容

Overcoming significant noise: Correlation-template-induction attack

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

Due to low Signal to Noise Ratio (SNR) in general experimental environments, previous attack methods such as correlation power analysis (CPA) do not always screen out the correct key value. Sometimes the success rate of the attack is so slight that we have to find other ways to make certain of the prosperity. In this paper, rather than adopting the traditional means of singling out a single key value, we suggest a way of setting up a threshold for the attack. Accordingly, we propose a feasible method to filter the inherently enlarging candidate key space, which is called correlation-template-induction attack. The method contains three steps: First, we apply a variation of CPA and get a set of candidate key values. Then, we filter the candidate key space with template attack, which is easy to implement and requires encryptions of just a few input data to screen out the correct key. Next, to achieve optimal of our attack, we mix the concept of induction together with our attack. The experimental results given in this article on an AES smart card implementation guarantee the effectiveness of our method.

源语言英语
主期刊名Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Proceedings
393-404
页数12
DOI
出版状态已出版 - 2012
已对外发布
活动8th International Conference on Information Security Practice and Experience, ISPEC 2012 - Hangzhou, 中国
期限: 9 4月 201212 4月 2012

出版系列

姓名Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
7232 LNCS
ISSN(印刷版)0302-9743
ISSN(电子版)1611-3349

会议

会议8th International Conference on Information Security Practice and Experience, ISPEC 2012
国家/地区中国
Hangzhou
时期9/04/1212/04/12

指纹

探究 'Overcoming significant noise: Correlation-template-induction attack' 的科研主题。它们共同构成独一无二的指纹。

引用此