首页 | 本学科首页   官方微博 | 高级检索  
   检索      

ARIA分组密码差分功耗分析
引用本文:计锋,王韬,赵新杰,吴克辉.ARIA分组密码差分功耗分析[J].军械工程学院学报,2011(4):44-47,55.
作者姓名:计锋  王韬  赵新杰  吴克辉
作者单位:军械工程学院计算机工程系,河北石家庄050003
基金项目:国家自然科学基金资助项目(60772082); 河北省自然科学基金资助项目(08M010)
摘    要:分析了密码算法加密过程的功耗泄露模型,给出了差分功耗分析的基本原理,针对ARIA分组密码中查找S盒的功耗泄漏进行了差分功耗分析,并进行仿真实验。实验结果表明:ARIA密码中S盒查表操作功耗消耗易遭受差分功耗攻击,对800个随机明文的功耗曲线进行实验分析,可获取ARIA加密前4轮轮密钥,结合密钥扩展算法即可获取128位的主密钥。

关 键 词:ARIA密码算法  S盒  差分功耗分析  功耗泄露模型

Differential Power Analysis against ARIA Block Cipher
JI Feng,WANG Tao,ZHAO Xin-jie,WU Ke-hui.Differential Power Analysis against ARIA Block Cipher[J].Journal of Ordnance Engineering College,2011(4):44-47,55.
Authors:JI Feng  WANG Tao  ZHAO Xin-jie  WU Ke-hui
Institution:(Department of Computer Engineering,Ordnance Engineering College,Shijiazhuang 050003,China)
Abstract:This paper introduces theories which are based upon power consumption models and data-dependent power consumption and presents the methods and steps of differential power analysis in detail.We use DPA attack on Block Cipher ARIA by S-box lookup table in the operating leak and correct secret key of encryption algorithm is cracked successfully with simulating experiments.Experiment results demonstrate that ARIA is vulnerable to DPA attack by nonlinear S-box lookup table in the operating leak.Simulation environment of 800 samples are enough to recover forward four round key,and then the 128 bit master key can be obtained by key expansion algorithm.
Keywords:ARIA  S-box  differential power analysis  power consumption models
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号