中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
how to characterize side-channel leakages more accurately?

文献类型:会议论文

作者Liu Jiye ; Zhou Yongbin ; Han Yang ; Li Jiantang ; Yang Shuguo ; Feng Dengguo
出版日期2011
会议名称7th International Conference on Information Security Practice and Experience, ISPEC 2011
会议日期30-May-20
会议地点Guangzhou, China
关键词Characterization Security systems
页码196-207
英文摘要The effectiveness of side-channel attacks strongly depends on to what extent the underlying leakage model characterizes the physical leakages of cryptographic implementations and on how largely the subsequent distinguisher exploits these leakages. Motivated by this, we propose a compact yet efficient approach to more accurately characterizing side-channel leakages. It is called Bitwise Weighted Characterization (BWC) approach. We use power analysis attacks as illustrative examples and construct two new BWC-based side-channel distinguishers, namely BWC-DPA and BWC-CPA. We present a comparative study of several distinguishers applied to both simulated power traces and real power measurements from an AES microcontroller prototype implementation to demonstrate the validity and the effectiveness of the proposed methods. For example, the number of traces required to perform successful BWC-CPA (resp. BWC-DPA) is only 66% (resp. 49%) of that of CPA (resp. DPA). Our results firmly validate the power and the accuracy of the proposed side-channel leakages characterization approach. © 2011 Springer-Verlag Berlin Heidelberg.
收录类别EI
会议录Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
会议录出版地Germany
ISSN号3029743
ISBN号9783642210303
源URL[http://124.16.136.157/handle/311060/14287]  
专题软件研究所_信息安全国家重点实验室_会议论文
推荐引用方式
GB/T 7714
Liu Jiye,Zhou Yongbin,Han Yang,et al. how to characterize side-channel leakages more accurately?[C]. 见:7th International Conference on Information Security Practice and Experience, ISPEC 2011. Guangzhou, China. 30-May-20.

入库方式: OAI收割

来源:软件研究所

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。