CN110460425A - A kind of attack method and system towards side channelization codes energy leakage signal - Google Patents

A kind of attack method and system towards side channelization codes energy leakage signal Download PDF

Info

Publication number
CN110460425A
CN110460425A CN201910902511.5A CN201910902511A CN110460425A CN 110460425 A CN110460425 A CN 110460425A CN 201910902511 A CN201910902511 A CN 201910902511A CN 110460425 A CN110460425 A CN 110460425A
Authority
CN
China
Prior art keywords
energy
key
sub
conjecture
curve
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910902511.5A
Other languages
Chinese (zh)
Other versions
CN110460425B (en
Inventor
周新平
乔珂欣
王洁
张永峰
马哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Unionpay Gold Card Technology Co Ltd
Original Assignee
Beijing Unionpay Gold Card Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Unionpay Gold Card Technology Co Ltd filed Critical Beijing Unionpay Gold Card Technology Co Ltd
Priority to CN201910902511.5A priority Critical patent/CN110460425B/en
Publication of CN110460425A publication Critical patent/CN110460425A/en
Application granted granted Critical
Publication of CN110460425B publication Critical patent/CN110460425B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides attack method and system towards side channelization codes energy leakage signal, establishes and assumes energy consumption matrix and guessed using sub-key by energy data classification.Classification results and energy leakage curve average after data processing obtains statistical value, obtain conjecture sub-key in the circuit sectionalizer value at time point.Judge whether to traverse all conjecture sub-keys, energy datum is traversed on all time points.If completion selects maximum circuit sectionalizer value, corresponding abscissa is sub-key, it is compared with true key to judge whether encryption device is safe.The present invention does not need to do it model hypothesis in the attack process to energy leakage signal and independent of any fixation or scale model, and only the distribution characteristics by analysing energy leakage signal in different sub-key conjectures is to restore the true key of encryption device.Due to directly analyzing the distribution of leakage signal and not depending on linear measurement mode, the nonlinear characteristic of energy leakage signal can be sufficiently excavated.

Description

A kind of attack method and system towards side channelization codes energy leakage signal
Technical field
The present invention relates to the analysis of side channelization codes, mathematical statistics and field of information security technology, more particularly to it is a kind of towards The attack method and system of side channelization codes energy leakage signal.
Background technique
As shown in Figure 1, encryption device is when running cryptographic algorithm, since the energy response of cmos device always will lead to password Equipment can leak information relevant to cryptographic algorithm, and leakage information includes but is not limited to: electromagnetic information, energy loss information, sound Message breath etc..The above leakage information of side channelization codes analysis and utilization and in conjunction with circuit sectionalizer can succeed decryption algorithm key letter Breath, constitutes a serious threat in actual use to encryption device.
This threat in order to prevent, encryption device are needed before being put into production by safety certification.Statistical analysis as shown in Figure 2 Module, in the prior art usually using leak detection or directly attack key in the way of relevant assessment is carried out to it, so Can the superiority and inferiority for attacking the method (i.e. circuit sectionalizer) of key be directly related to encryption device and effectively be authenticated and encryption device Assessment result it is whether outstanding.
Specifically, the purpose of circuit sectionalizer be analyzed jointly using conjecture key, median and actual leakage information it is close True key in decoding apparatus.For in the side Multiple Channel Analysis method of encryption device, more commonly used at present is based on equal value difference DOM The differential power analysis method DPA (Differential power analysis) of (Difference of mean), it is based on skin Your inferior relative coefficient correlation energy spectrometer CPA (Correlation power analysis) and based on the template portrayed point It analyses TA (Template attacks).
DPA is the side Multiple Channel Analysis method being suggested earliest, since primitive curve is divided into two classes and in practical operation by it In it is simple and convenient, but it only makes it that can not give full play to all information of median to lead to efficiency ratio using the characteristics of two classification It is relatively low.The drawbacks of correlation coefficient analysis CPA can overcome two classification of DPA to bring, however due to being analyzed in practical CPA The energy model based on ratio has been introduced in journey so CPA is not when some cmos circuits do not meet this energy model It is applicable in.Template attack is acknowledged as most effective means and can portray to carry out matching attack in arbitrary situation after leak model. The premise of this attack pattern is: analyst possesses one and is used to portray with by the equipment as attack equipment, and in template The large-scale sparse and singular matrix of matching stage, which is inverted, brings very big challenge to calculating.
So how to encryption device key carry out safety certification during not by energy model, meter The limitation of calculation amount and equipment becomes urgent problem to be solved.
Summary of the invention
The present invention provides a kind of attack method and system towards side channelization codes energy leakage signal, to solve right The key of encryption device carries out the problem of limitation during safety certification by energy model, calculation amount and equipment.
To achieve the goals above, technical solution of the present invention provides a kind of towards side channelization codes energy leakage signal Attack method, comprising: collecting energy leakage signal, the median for selecting energy model and being attacked.It establishes and assumes energy consumption Matrix is simultaneously guessed using sub-key by energy data classification, and classification results are obtained.Using AD (Anderson-Darling) to institute It states classification results and primary energy curve carries out data processing, obtain statistical value.It averages to statistical value, obtains conjecture sub-key In the circuit sectionalizer value at time point.Judge whether to traverse all conjecture sub-keys, if then judging whether on all time points The energy datum is traversed, if otherwise classifying on the time point not traversed to energy datum.If traversal is completed, from several areas Divide in device value and select maximum circuit sectionalizer value, corresponding abscissa is sub-key.To sub-key and true key be compared with Judge whether encryption device is safe.
As a preferred embodiment of the above technical solution, preferably, collecting energy leakage signal, comprising: generate one when acquisition every time Random data is encrypted or is decrypted to the random data, and the energy leakage curve generated when to encryption or decryption is adopted Collection;Repeated acquisition movement, collected energy leakage matrix are energy leakage signal;Wherein, energy leakage signal includes a plurality of Energy leakage curve, every energy leakage curve are made of positive integer time point.
As a preferred embodiment of the above technical solution, assume energy consumption matrix preferably, establishing and utilize sub-key conjecture will Energy datum classification, obtains classification results, comprising: conjecture sub-key and clear data is chosen, according to conjecture sub-key and plaintext Data, which are established, assumes energy consumption matrix;Classified according to hypothesis energy consumption matrix to energy datum, obtains classification results;It calculates Complexity: O (n2Q·2BS·T);Wherein, n is the item number of energy leakage curve, and Q is the sampling precision of oscillograph, and BS is point The block length of group password, T are sampling number included by every energy leakage curve.Wherein, energy datum is energy leakage Data corresponding to time point on curve.
As a preferred embodiment of the above technical solution, it preferably, being classified according to hypothesis energy consumption matrix to energy datum, obtains The classification results, comprising: according to the time point t on the primary energy curve, take t to arrange from energy leakage curve P;From vacation If taking the corresponding row of each conjecture sub-key in energy consumption matrix;According to t column row pair corresponding with conjecture sub-key Energy datum is classified, and classification results are obtained.
As a preferred embodiment of the above technical solution, preferably, carrying out data to classification results and primary energy curve using AD Processing, obtains statistical value, specifically: difference of each classification results respectively with primary energy curve respective column is obtained by AD; Wherein, each classification results obtain a difference when primary energy curve respective column is solved with it, and difference is statistical value.
As a preferred embodiment of the above technical solution, preferably, averaging to statistical value, conjecture sub-key is obtained at time point Circuit sectionalizer value, further includes: energy datum classification is carried out to each conjecture sub-key, is obtained respectively according to its corresponding classification results Every class statistical value;It averages to every class statistical value, obtains each conjecture sub-key in the circuit sectionalizer value at time point.
As a preferred embodiment of the above technical solution, preferably, judging whether to traverse all conjecture sub-keys, if then judging Whether the energy datum is traversed on all time points, comprising: completed if not traversed to all conjecture sub-keys, to not The conjecture sub-key of traversal carries out energy datum classification;It does not traverse at all time points if guessing in sub-key, is not traversing Time point on to energy datum classify.
As a preferred embodiment of the above technical solution, preferably, being compared to sub-key and true key to judge that password is set It is standby whether safe, comprising: to compare sub-key and true key to judge in this attack process under energy leakage matrix Whether successful attack goes out true key.
Technical solution of the present invention additionally provides a kind of attacking system towards side channelization codes energy leakage signal, comprising: Signal acquisition and energy model selecting unit are used for collecting energy leakage signal, select energy model, select the centre to be attacked Value;A random data is generated when acquisition every time, random data is encrypted or is decrypted, the energy generated when to encryption or decryption Leakage curve is acquired;Repeated acquisition movement, collected energy leakage matrix are energy leakage signal;Wherein, energy is let out Dew letter includes a plurality of energy leakage curve, and every energy leakage curve is made of positive integer time point.
Taxon is assumed energy consumption matrix and using sub-key conjecture by energy data classification for establishing, is obtained Classification results;Energy consumption matrix is assumed specifically for choosing and establishing according to conjecture sub-key and clear data;According to hypothesis Energy consumption matrix classifies to energy datum, obtains classification results;Wherein, the energy datum is the signal acquisition and energy Measure data corresponding to the time point on the energy leakage curve that model selection unit obtains.
Statistical value acquiring unit, classification results and primary energy curve for being obtained using AD to taxon are counted According to processing, statistical value is obtained;Specifically, obtaining difference of each classification results respectively with primary energy curve respective column by AD Value;Wherein, each classification results obtain a difference when primary energy curve respective column is solved with it, and the difference is Statistical value.
Circuit sectionalizer value acquiring unit, the statistical value for obtaining to statistical value acquiring unit are averaged, and it is close to obtain conjecture Circuit sectionalizer value of the key at time point;Specifically, energy datum classification is carried out to each conjecture sub-key, according to its corresponding classification As a result every class statistical value is obtained respectively;It averages to every class statistical value, obtains each conjecture sub-key in the area at time point Divide device value.
Ergodic judgement unit, for judge whether to all conjecture sub-keys traverse, if then judge whether sometimes Between put it is upper the energy datum is traversed, the otherwise then conjecture sub-key progress energy datum classification to not traversing;It is also used to, if Guess in sub-key and do not traversed at all time points, then classifies on the time point not traversed to energy datum.
Sub-key acquiring unit obtains single if completing for Ergodic judgement unit judges traversal from the circuit sectionalizer value Maximum circuit sectionalizer value is selected in several circuit sectionalizer values that member obtains, corresponding abscissa is sub-key.
Security judgment unit, sub-key and true key for obtaining to sub- key acquiring unit are compared to sentence Breaking in this attack process, whether successful attack goes out true key under the energy leakage matrix, if otherwise judging encryption device Safety.
As a preferred embodiment of the above technical solution, preferably, taxon includes: that column obtain subelement, for according to Time point t on primary energy curve takes t to arrange from energy leakage curve P.Row obtains subelement, is used for from the hypothesis energy The corresponding row of each conjecture sub-key is taken in amount absorption matrix.Classification results obtain subelement, for obtaining son according to column The t columns and rows that unit obtains obtain the corresponding row of conjecture sub-key that subelement obtains and classify to the energy datum, Obtain the classification results.
Technical solution of the present invention provides a kind of attack method towards side channelization codes energy leakage signal and is, acquires Energy leakage signal selects energy model;It establishes and assumes energy consumption matrix and guessed using sub-key by energy data classification. Data processing is carried out to classification results and primary energy curve, is averaged after obtaining statistical value to it, conjecture sub-key is obtained and exists The circuit sectionalizer value at time point.Judge whether to traverse all conjecture sub-keys, if to energy datum time on all time points It goes through, energy datum classification otherwise is carried out to the conjecture sub-key not traversed;If traversal is completed, selected most from several circuit sectionalizer values Big circuit sectionalizer value, corresponding abscissa are sub-key.Sub-key and true key are compared to judge that encryption device is No safety.
The present invention provides by distribution characteristics of the analysing energy leakage signal in different sub-key conjecture with Recover the private key of encryption device.The present invention is readily applicable to independent of any fixed model or scale model " cluster " (Cluster) model in the Multiple Channel Analysis of side.In addition, the present invention is disobeyed due to being the direct distribution for analyzing leakage signal Any linear measurement mode of Lai Yu, it is possible to sufficiently excavate the nonlinear characteristic of energy leakage signal.Compared with prior art, Good effect of the present invention are as follows: to not needing to do leakage signal any model hypothesis in the attack process of energy leakage signal, Independent of scale model, and universal model can be extended to;Secondly, directly dividing based on leakage signal Statistical Distribution Characteristics Analysis significantly more efficient can utilize leakage signal and reduce information loss.Further, method complexity of the invention is O (n 2Q·2BST), linear with used energy curve item number n, technical solution of the present invention is apparent from complexity It is low, the small advantage of calculation amount.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to make one simply to introduce, it should be apparent that, the accompanying drawings in the following description is the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is the side channel leakage signal schematic representation that encryption device described in background technique generates.
Fig. 2 is circuit sectionalizer schematic diagram.
Fig. 3 is that a kind of process that the attack method embodiment towards side channelization codes energy leakage signal provides of the present invention is shown It is intended to one.
Fig. 4 is that a kind of process that the attack method embodiment towards side channelization codes energy leakage signal provides of the present invention is shown It is intended to two.
Fig. 5 is the flow diagram of step 206 in Fig. 4.
Fig. 6 is primary energy curve.
Fig. 7 is the attack result figure of technical solution of the present invention.
Fig. 8 is a kind of structural schematic diagram of the attacking system towards side channelization codes energy leakage signal of the present invention.
Fig. 9 is the structural schematic diagram of taxon in Fig. 8.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Fig. 3 is flow diagram one provided in an embodiment of the present invention, for summarizing technical solution of the present invention, is such as schemed Shown in 3:
Step 101, collecting energy leakage signal, the median for selecting energy model and being attacked.
A random data is generated when acquisition every time, random data is encrypted or is decrypted, acquisition is encrypted or produced when decrypting Raw energy leakage curve.Repeated acquisition movement, collected energy leakage matrix are energy leakage signal.
Wherein, energy leakage signal includes a plurality of energy leakage curve, and every energy leakage curve is by several time points group At.
Step 102 is established and assumes energy consumption matrix and guessed using sub-key by energy data classification.
Conjecture sub-key and clear data are chosen, is established according to conjecture sub-key and clear data and assumes energy consumption square Battle array.Classified according to hypothesis energy consumption matrix to energy datum, obtains classification results.
It is specific: based on the time point t on primary energy curve, t to be taken to arrange from energy leakage curve P.From hypothesis energy The corresponding row of conjecture sub-key is taken in amount absorption matrix;Energy datum is carried out according to t column row corresponding with conjecture sub-key Classification.
Wherein, the energy datum is data corresponding to the time point on energy leakage curve.
Step 103 carries out data processing to the classification results and primary energy curve using AD, obtains statistical value.
Each classification results difference with primary energy curve respective column respectively is obtained by AD (Anderson-Darling) Value.Wherein, each classification results obtain a difference when primary energy curve respective column is solved with it, and difference is statistics Value.
Step 104 averages to statistical value, obtains conjecture sub-key in the circuit sectionalizer value at time point.
Energy datum classification is carried out to each conjecture sub-key, obtains the system of every class respectively according to its corresponding classification results Evaluation.It averages to these statistical values, obtains each conjecture sub-key in the circuit sectionalizer value at time point.
Step 105 judges whether to traverse all conjecture sub-keys, if it is not, return step 102 is to conjecture not traversed Key carries out energy datum classification.
Step 106 judges whether to traverse energy datum on all time points, if it is not, return step 102 is not traversing Time point on to energy datum classify.
If step 107 traverses the energy datum on all time points and completes, selected from several circuit sectionalizer values maximum Circuit sectionalizer value, corresponding abscissa are sub-key.
Step 108 is compared the sub-key and true key to judge whether encryption device is safe.
Sub-key and true key are compared with judge in this attack process under the energy leakage matrix whether Successful attack goes out true key.
Technical solution of the present invention is described in detail in a current specific embodiment, the flow chart of declarative procedure such as Fig. 4 institute Show:
For attacking AES-128 key, intermediate state data and key length are 8 bits.
Step 201, collecting energy leakage signal.
A random data m is randomly generated in the AES key of fixed password equipment every timei, using encryption device to miIt carries out The corresponding energy leakage curve P with time change of encryption acquisitioni, to miIt carries out an encryption or decryption is primary, oscillograph acquisition adds Close or decrypting process energy leakage curve Pi.It repeats to generate random number repetition n times, oscillograph acquires all encrypting and decrypting processes Energy leakage curve P, obtain corresponding energy leakage matrix P ∈ RN×T.Wherein, every energy leakage curve is by several Time point T composition.
Step 202, the selection intermediate value function f and energy model PM (Power Model) to be attacked.
Intermediate value function f can be the value that can be speculated by plaintext or by the presumable value of ciphertext.Due to ADSD not base In any scale model, so being only required to be a kind of disaggregated model herein, this disaggregated model can be according to the cluster side of priori Method obtains, and can also be generated according to general Hamming weight model or Hamming distance model, it might even be possible to be produced by bit model It is raw.
Energy model PM can be it is any it is significant on classification " cluster " (Cluster) model be also possible to least significant bit Bit model, be not limited to traditional Hamming weight model and Hamming distance model.
Clear data M is mapped to hypothesis energy consumption, and compares all sub-keys of output with primary energy curve The circuit sectionalizer value of conjecture:
The nonlinear change of the AES-128 first round is selected to export as the point of attack and Hamming weight model (Hamming Weight, HW) it is energy model, specific attack process is described as follows:
Step 203 takes key conjecture value g and i-th of clear data M [i].g(0≤g≤255)
Step 204 establishes the hypothesis energy consumption matrix H P that size is 256*N.
Energy consumption matrix is assumed specifically, establishing according to key the conjecture value g and clear data M [i] in step 203 HP repeats each key conjecture g (0≤g≤255) to take i (1≤i≤N), later, for i (1≤i≤N), repeats following It calculates:
It calculatesHP is indicated are as follows:
Wherein, the number of g is limited, M [i] (1≤i≤N).
Step 205 generates the circuit sectionalizer value matrix ds that size is 256*T', wherein T'< T.
For each key conjecture value g (0≤g≤255), repeat the above steps.
Computation complexity: O (n2Q·2BST), wherein n represents the item number that collecting energy reveals curve, and Q is oscillograph Sampling precision, BS represents the block length of block cipher, and T represents the sampling number that every curve is included, it can be seen that, this Inventive technique scheme is that n is linear numerical, and the complexity for being apparent from technical solution of the present invention is low.
Step 206 classifies to energy datum according to hypothesis energy consumption matrix H P.
Wherein, energy datum is data corresponding to each time point on energy leakage curve.For each sub-key Energy leakage plot P is divided into several classifications by key conjecture value g, is utilized instruments of inspection AD (Anderson Darling) point The distribution difference of these classifications and primary energy curve is not calculated, and is averaged the differentiation of the candidate value as current sub-key Device value ds (DistinguisherScore)
Step 206 is further described, as shown in Figure 5:
Step 2061, to the time point t on primary energy curve, the sampling P [:] [t] that takes t to arrange from energy leakage curve (energy datum).
For example, time point is if t1Take t1Arrange P [:] [t1], if t2Take t2Arrange P [:] [t2] ... if tnTnArrange P [:][tn]。
Step 2062 takes the corresponding row HP [g] [:] of each key conjecture value g from HP [g] [i].
Such as: g1Under conjecture, it is assumed that energy datum is HP [g1] [:], g2Under conjecture, it is assumed that energy datum is HP [g2] [:]…gnUnder conjecture, it is assumed that energy datum is HP [gn][:]。
Step 2063 classifies to P [:] [t] according to HP [g] [:].
Specifically, P [:] [t] is divided into 9 class P using the g row HP [g] [:] of hypothesis energy consumption1,...,P9, this is Classification results.
Step 2064, merging point result and P [:] [t] obtain sequence Y.
Step 207, the statistical value that all categories z and primary energy curve are found out using AD.
Specifically, P1Merging with P [:] [t] then can solve st [1], P using formula2Merge then benefit with P [:] [t] St [2] can be solved with formula, and so on, PzMerging with P [:] [t] then can solve st [z] using formula.
Statistical value:
Wherein, each statistical value st [i] is solved.Wherein YtIt represents after merging the classification divided and primary energy curve Element number less than or equal to small t-th, the classification P that behalf dividesiElement number.For all j (1≤j≤9), weight It is multiple to calculate.
Step 208 is averaged after summing to above-mentioned statistical value.
Mean value is assigned to current key conjecture value g in the circuit sectionalizer value of current location t by step 209:
Ds [g] [t] is the average value of above-mentioned st.
Step 210 repeats 206 to 209 and obtains the circuit sectionalizer value ds of all key conjecture value g.
Step 211 judges whether to complete conjecture sub-key g traversal, and return step 206 is to conjecture not traversed if not Key carries out energy datum classification.
Step 212 judges whether to traverse energy datum on all time points, and return step 206 is not traversing if not Time point on to energy datum classify.
Step 213 selects obtained all circuit sectionalizer values according to maximum principle, and maximum circuit sectionalizer value is corresponding Abscissa is sub-key.
The corresponding abscissa of the maximum value for the circuit sectionalizer matrix for taking above-mentioned steps to obtain is that this attacks obtained sub-key.
Step 214 is compared sub-key and true key to judge whether encryption device is safe.
It may determine that this time attack energy leakage in energy leakage matrix specifically, sub-key and original cipher key are compared Whether successful attack goes out key in the case that curved line number is N.For each N, repeated acquisition repeats to attack according to above-mentioned steps Available present invention success rate curve graph relevant to N.
The present invention also provides a kind of attacking systems towards side channelization codes energy leakage signal, and structural schematic diagram is as schemed Shown in 8, comprising:
Signal acquisition and energy model selecting unit 71 are used for collecting energy leakage signal, select energy model, and selection is wanted The median of attack;A random data is generated when acquisition every time, the random data is encrypted or decrypted, to encryption or solution The energy leakage curve generated when close is acquired;Repeated acquisition movement, collected energy leakage matrix are that the energy is let out Reveal signal;Wherein, the energy leakage letter includes a plurality of energy leakage curve, and every energy leakage curve is by positive integer Time point composition.
Taxon 72 is assumed energy consumption matrix and using sub-key conjecture by energy data classification for establishing, is obtained To classification results.Energy consumption matrix is assumed specifically for choosing and establishing according to conjecture sub-key and clear data;According to vacation If energy consumption matrix classifies to energy datum, classification results are obtained;Wherein, energy datum is signal acquisition and energy model Data corresponding to the time point on energy leakage curve that selecting unit 71 obtains.
Statistical value acquiring unit 73, classification results and energy curve for being obtained using AD to taxon 72 are counted According to processing, statistical value is obtained;Specifically, obtaining difference of each classification results respectively with the energy curve respective column by AD Value;Wherein, each classification results obtain a difference when energy curve respective column is solved with it, and the difference is described Statistical value.
Circuit sectionalizer value acquiring unit 74, the statistical value for obtaining to statistical value acquiring unit 73 are averaged, are guessed Circuit sectionalizer value of the sub-key at time point;Specifically, energy datum classification is carried out to each conjecture sub-key, it is corresponding according to its Classification results obtain every class statistical value respectively;It averages to every class statistical value, obtains each conjecture sub-key in the institute at time point State circuit sectionalizer value.
Ergodic judgement unit 75 traverses all conjecture sub-keys for judging whether, if then judging whether all The energy datum is traversed on time point, otherwise returns to taxon 72, energy number is carried out to the conjecture sub-key not traversed According to classification;It is also used to, if not traversing at all time points in conjecture sub-key, returns to taxon 72 in the time not traversed Classify on point to energy datum.
Sub-key acquiring unit 76 obtains single if completing for the judgement traversal of Ergodic judgement unit 75 from circuit sectionalizer value Maximum circuit sectionalizer value is selected in several circuit sectionalizer values that member 74 obtains, corresponding abscissa is sub-key.
Security judgment unit 77, sub-key and true key for obtaining to sub- key acquiring unit 76 are compared To judge whether successful attack goes out true key under energy leakage matrix in this attack process, if otherwise judging encryption device Safety.
As shown in figure 8, taxon 72 includes:
Column obtain subelement 81, for taking t from energy leakage curve P according to the time point t on primary energy curve Column.
Row obtains subelement 82, for taking the corresponding row of each conjecture sub-key from hypothesis energy consumption matrix.
Classification results obtain subelement 83, obtain subelement for obtaining the t columns and rows that subelement 81 obtains according to column The 82 corresponding rows of conjecture sub-key obtained classify to energy datum, obtain classification results.
Technical solution of the present invention provides a kind of attack method towards side channelization codes energy leakage signal and is, acquires Energy leakage signal selects energy model;It establishes and assumes energy consumption matrix and guessed using sub-key by energy data classification. Data processing is carried out to classification results and primary energy curve, is averaged after obtaining statistical value to it, conjecture sub-key is obtained and exists The circuit sectionalizer value at time point.Judge whether to traverse all conjecture sub-keys, if to energy datum time on all time points It goes through, energy datum classification otherwise is carried out to the conjecture sub-key not traversed;If traversal is completed, selected most from several circuit sectionalizer values Big circuit sectionalizer value, corresponding abscissa are sub-key.Sub-key and true key are compared to judge that encryption device is No safety.
The present invention provides by distribution characteristics of the analysing energy leakage signal in different sub-key conjecture with Recover the private key of encryption device.The present invention is readily applicable to independent of any fixed model or scale model " cluster " (Cluster) model in the Multiple Channel Analysis of side.In addition, the present invention is disobeyed due to being the direct distribution for analyzing leakage signal Any linear measurement mode of Lai Yu, it is possible to sufficiently excavate the nonlinear characteristic of energy leakage signal.Compared with prior art, Good effect of the present invention are as follows: to not needing to do leakage signal any model hypothesis in the attack process of energy leakage signal, Independent of scale model, and universal model can be extended to;Secondly, directly dividing based on leakage signal Statistical Distribution Characteristics Analysis significantly more efficient can utilize leakage signal and reduce information loss.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of attack method towards side channelization codes energy leakage signal, which is characterized in that the described method includes:
Collecting energy leakage signal, the median for selecting energy model and being attacked;
It establishes and assumes energy consumption matrix and guessed using sub-key by energy data classification, obtain classification results;
Data processing is carried out to the classification results and primary energy curve using AD, obtains statistical value;
It averages to the statistical value, obtains conjecture sub-key in the circuit sectionalizer value at time point;
Judge whether to traverse all conjecture sub-keys, if then judging whether on all time points to the energy datum time It goes through, if otherwise classifying on the time point not traversed to energy datum;
It is completed if being traversed on all time points to the energy datum, maximum circuit sectionalizer is selected from several circuit sectionalizer values Value, corresponding abscissa are sub-key;
The sub-key and true key are compared to judge whether encryption device is safe.
2. the attack method according to claim 1 towards side channelization codes energy leakage signal, which is characterized in that described Collecting energy leakage signal, comprising:
A random data is generated when acquisition every time, the random data is encrypted or decrypted, is generated when to encryption or decryption Energy leakage curve be acquired;
Repeated acquisition movement, collected energy leakage matrix are the energy leakage signal;
Wherein, the energy leakage signal includes a plurality of energy leakage curve, and every energy leakage curve is by positive integer Time point composition.
3. the attack method according to claim 2 towards side channelization codes energy leakage signal, which is characterized in that described It establishes and assumes energy consumption matrix and guessed using sub-key by energy data classification, obtain classification results, comprising:
Conjecture sub-key and clear data are chosen, is established according to the conjecture sub-key and the clear data and assumes energy consumption Matrix;
Classified according to the hypothesis energy consumption matrix to energy datum, obtains the classification results;
Computation complexity: O (n2Q·2BS·T);
Wherein, n is the item number of the energy leakage curve, and Q is the sampling precision of oscillograph, and BS is that the grouping of block cipher is long Degree, T are sampling number included by every energy leakage curve;Wherein, the energy datum is, on the energy leakage curve Time point corresponding to data.
4. the attack method according to claim 3 towards side channelization codes energy leakage signal, which is characterized in that described Classified according to the hypothesis energy consumption matrix to energy datum, obtain the classification results, comprising:
According to the time point t on the primary energy curve, t is taken to arrange from energy leakage curve P;
The corresponding row of each conjecture sub-key is taken from the hypothesis energy consumption matrix;
Row corresponding with the conjecture sub-key is arranged according to the t to classify to the energy datum, obtains the classification As a result.
5. the attack method according to claim 1 towards side channelization codes energy leakage signal, which is characterized in that described Data processing is carried out to the classification results and primary energy curve using AD, obtains statistical value, specifically:
Difference of each classification results respectively with the primary energy curve respective column is obtained by AD;
Wherein, each classification results obtain a difference, the difference when primary energy curve respective column is solved with it For the statistical value.
6. the attack method towards side channelization codes energy leakage signal according to claim 4 and 5, which is characterized in that It is described to average to the statistical value, conjecture sub-key is obtained in the circuit sectionalizer value at time point, further includes:
Energy datum classification is carried out to each conjecture sub-key, obtains every class statistical value respectively according to its corresponding classification results;
It averages to every class statistical value, obtains each conjecture sub-key in the circuit sectionalizer value at time point.
7. the attack method according to claim 1 towards side channelization codes energy leakage signal, which is characterized in that described Judge whether to traverse all conjecture sub-keys, if then judging whether to traverse the energy datum on all time points, Otherwise energy datum classification then is carried out to the conjecture sub-key not traversed;, comprising:
If not completing to all conjecture sub-key traversals, energy datum classification is carried out to the conjecture sub-key not traversed;
It does not traverse at all time points if guessing in sub-key, classifies on the time point not traversed to energy datum.
8. the attack method according to claim 2 towards side channelization codes energy leakage signal, which is characterized in that described The sub-key and true key are compared to judge whether encryption device is safe, comprising:
The sub-key and true key are compared with judge in this attack process under the energy leakage matrix whether Successful attack goes out true key.
9. a kind of attacking system towards side channelization codes energy leakage signal, can be realized according to claims 1-8 A kind of method, comprising:
Signal acquisition and energy model selecting unit are used for collecting energy leakage signal, select energy model, what selection to be attacked Median;A random data is generated when acquisition every time, the random data is encrypted or decrypted, is produced when to encryption or decryption Raw energy leakage curve is acquired;Repeated acquisition movement, collected energy leakage matrix are the energy leakage signal; Wherein, the energy leakage signal includes a plurality of energy leakage curve, and every energy leakage curve is by the positive integer time Point composition;
Taxon assumes energy consumption matrix and using sub-key conjecture by energy data classification for establishing, is classified As a result;Energy consumption matrix is assumed specifically for choosing and establishing according to conjecture sub-key and clear data;According to the hypothesis Energy consumption matrix classifies to energy datum, obtains the classification results;Wherein, the energy datum is the signal acquisition And data corresponding to the time point on the energy leakage curve of energy model selecting unit acquisition;
Statistical value acquiring unit, classification results and primary energy curve for being obtained using AD to the taxon are counted According to processing, statistical value is obtained;Specifically, it is corresponding with the primary energy curve respectively to obtain each classification results by AD The difference of column;Wherein, each classification results obtain a difference when primary energy curve respective column is solved with it, described Difference is the statistical value;
Circuit sectionalizer value acquiring unit, the statistical value for obtaining to the statistical value acquiring unit are averaged, and it is close to obtain conjecture Circuit sectionalizer value of the key at time point;Specifically, energy datum classification is carried out to each conjecture sub-key, according to its corresponding classification As a result every class statistical value is obtained respectively;It averages to every class statistical value, obtains each conjecture sub-key in the institute at time point State circuit sectionalizer value;
Ergodic judgement unit traverses all conjecture sub-keys for judging whether, if then judging whether at all time points On the energy datum is traversed, if otherwise carrying out energy datum classification to the conjecture sub-key that does not traverse;It is also used to, if conjecture It does not traverse, then classifies to energy datum on the time point not traversed at all time points in sub-key;
Sub-key acquiring unit obtains if completing for Ergodic judgement unit judges traversal from the circuit sectionalizer value acquiring unit Maximum circuit sectionalizer value is selected in several circuit sectionalizer values taken, corresponding abscissa is sub-key;
Security judgment unit, sub-key and true key for obtaining to the sub-key acquiring unit are compared to sentence Breaking in this attack process, whether successful attack goes out true key under the energy leakage matrix, if otherwise judging encryption device Safety.
10. the attacking system according to claim 9 towards side channelization codes energy leakage signal, the taxon packet It includes:
Column obtain subelement, for taking t to arrange from energy leakage curve P according to the time point t on the primary energy curve;
Row obtains subelement, for taking the corresponding row of each conjecture sub-key from the hypothesis energy consumption matrix;
Classification results obtain subelement, obtain for obtaining the t columns and rows acquisition subelement that subelement obtains according to the column The corresponding row of the conjecture sub-key classify to the energy datum, obtain the classification results.
CN201910902511.5A 2019-09-24 2019-09-24 Attack method and system for side channel password energy leakage signal Active CN110460425B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910902511.5A CN110460425B (en) 2019-09-24 2019-09-24 Attack method and system for side channel password energy leakage signal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910902511.5A CN110460425B (en) 2019-09-24 2019-09-24 Attack method and system for side channel password energy leakage signal

Publications (2)

Publication Number Publication Date
CN110460425A true CN110460425A (en) 2019-11-15
CN110460425B CN110460425B (en) 2023-05-09

Family

ID=68492600

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910902511.5A Active CN110460425B (en) 2019-09-24 2019-09-24 Attack method and system for side channel password energy leakage signal

Country Status (1)

Country Link
CN (1) CN110460425B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110932841A (en) * 2019-11-27 2020-03-27 北京智慧云测信息技术有限公司 System and method for searching optimal acquisition position of electromagnetic side information
CN111211886A (en) * 2020-04-20 2020-05-29 成都信息工程大学 Energy analysis detection method for SM2 decryption algorithm
CN111351992A (en) * 2020-02-20 2020-06-30 南方电网科学研究院有限责任公司 Chip security assessment method based on electromagnetic side channel analysis and related device
CN111614459A (en) * 2020-05-29 2020-09-01 上海交通大学 Side channel analysis method for BLE key negotiation protocol
CN112287354A (en) * 2020-10-29 2021-01-29 天津津航计算技术研究所 Bypass attack simulation system of password chip
CN112769540A (en) * 2021-01-11 2021-05-07 广东技术师范大学 Method, system, equipment and storage medium for diagnosing side channel information leakage
CN114614966A (en) * 2022-02-21 2022-06-10 南京航空航天大学 Side channel analysis method for sparse polynomial multiplication in LAC scheme
CN115250172A (en) * 2022-09-22 2022-10-28 千纳微电子技术(南通)有限公司 Side channel protection method and system under dynamic frequency switching
CN115270204A (en) * 2022-09-28 2022-11-01 南方电网数字电网研究院有限公司 Detection method, system, storage medium and equipment for chip circuit information leakage

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014006484A (en) * 2012-06-27 2014-01-16 Tokai Rika Co Ltd Side-channel evaluation device and side-channel evaluation method
CN106156615A (en) * 2016-06-21 2016-11-23 上海观源信息科技有限公司 Based on class separability sentence away from bypass circuit sectionalizer method and system
CN108604981A (en) * 2015-12-11 2018-09-28 巴黎矿业电信学院 Method and apparatus for estimating secret value
US20180323958A1 (en) * 2017-05-03 2018-11-08 Seagate Technology, Llc Defending against a side-channel information attack in a data storage device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014006484A (en) * 2012-06-27 2014-01-16 Tokai Rika Co Ltd Side-channel evaluation device and side-channel evaluation method
CN108604981A (en) * 2015-12-11 2018-09-28 巴黎矿业电信学院 Method and apparatus for estimating secret value
CN106156615A (en) * 2016-06-21 2016-11-23 上海观源信息科技有限公司 Based on class separability sentence away from bypass circuit sectionalizer method and system
US20180323958A1 (en) * 2017-05-03 2018-11-08 Seagate Technology, Llc Defending against a side-channel information attack in a data storage device

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110932841A (en) * 2019-11-27 2020-03-27 北京智慧云测信息技术有限公司 System and method for searching optimal acquisition position of electromagnetic side information
CN111351992B (en) * 2020-02-20 2022-08-02 南方电网科学研究院有限责任公司 Chip security assessment method based on electromagnetic side channel analysis and related device
CN111351992A (en) * 2020-02-20 2020-06-30 南方电网科学研究院有限责任公司 Chip security assessment method based on electromagnetic side channel analysis and related device
CN111211886B (en) * 2020-04-20 2020-07-14 成都信息工程大学 Energy analysis detection method for SM2 decryption algorithm
CN111211886A (en) * 2020-04-20 2020-05-29 成都信息工程大学 Energy analysis detection method for SM2 decryption algorithm
CN111614459A (en) * 2020-05-29 2020-09-01 上海交通大学 Side channel analysis method for BLE key negotiation protocol
CN111614459B (en) * 2020-05-29 2021-08-06 上海交通大学 Side channel analysis method for BLE key negotiation protocol
CN112287354A (en) * 2020-10-29 2021-01-29 天津津航计算技术研究所 Bypass attack simulation system of password chip
CN112769540A (en) * 2021-01-11 2021-05-07 广东技术师范大学 Method, system, equipment and storage medium for diagnosing side channel information leakage
CN112769540B (en) * 2021-01-11 2023-05-05 广东技术师范大学 Diagnosis method, system, equipment and storage medium for side channel information leakage
CN114614966A (en) * 2022-02-21 2022-06-10 南京航空航天大学 Side channel analysis method for sparse polynomial multiplication in LAC scheme
CN115250172A (en) * 2022-09-22 2022-10-28 千纳微电子技术(南通)有限公司 Side channel protection method and system under dynamic frequency switching
CN115250172B (en) * 2022-09-22 2022-12-27 千纳微电子技术(南通)有限公司 Method and system for protecting side channel under dynamic frequency switching
CN115270204A (en) * 2022-09-28 2022-11-01 南方电网数字电网研究院有限公司 Detection method, system, storage medium and equipment for chip circuit information leakage

Also Published As

Publication number Publication date
CN110460425B (en) 2023-05-09

Similar Documents

Publication Publication Date Title
CN110460425A (en) A kind of attack method and system towards side channelization codes energy leakage signal
Zhang et al. An efficient image encryption scheme based on S-boxes and fractional-order differential logistic map
CN103166752B (en) Round function is selected to be the application that object of attack carries out the channel energy analysis of SM4 cryptographic algorithm side
Boriga et al. A new fast image encryption scheme based on 2D chaotic maps
CN108604981B (en) Method and apparatus for estimating secret value
CN103227717B (en) The input of round key XOR is selected to carry out the method that SM4 cryptographic algorithm side channel energy is analyzed
CN107508678A (en) The side-channel attack method of RSA masks defence algorithm based on machine learning
CN103530474A (en) AES (advanced encryption standard) algorithm circuit oriented method for testing differential power attack
CN104978363B (en) The detection method and system of a kind of Encryption Algorithm
CN104836666A (en) Power analysis attack method for SM2 decryption algorithm
Toktas et al. A robust bit-level image encryption based on Bessel map
CN113806781B (en) 2D-LCLM-based energy Internet data packet encryption method
CN104796250A (en) Side channel attack method for implementation of RSA (Rivest, Shamir and Adleman) cipher algorithms M-ary
Fei et al. An image encryption algorithm based on mixed chaotic dynamic systems and external keys
Shao et al. Chaotic image encryption using piecewise-logistic-sine map
CN116073988A (en) Hybrid denoising-based method for detecting energy analysis attack resistance
CN104780051A (en) Side channel attack method for SM2 public key cryptography encryption algorithm
CN111934852A (en) AES password chip electromagnetic attack method and system based on neural network
CN106156615B (en) Based on class separability sentence away from bypass circuit sectionalizer method and system
Hu et al. An effective differential power attack method for advanced encryption standard
Kim et al. Image-based anomaly detection technique: algorithm, implementation and effectiveness
CN108155984B (en) Reverse engineering analysis method for cryptographic algorithm cluster based on energy analysis
CN105897401B (en) General differential power consumption analysis method and system based on bit
CN106357378A (en) Key detection method applied to SM2 signature and system thereof
Babu et al. Higher dimensional chaos for Audio encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant