BS-CPA : Built-In Determined Sub-Key Correlation Power Analysis
スポンサーリンク
概要
- 論文の詳細を見る
Correlation power analysis (CPA) is a well-known attack against cryptographic modules with which an attacker evaluates the correlation between the power consumption and the sensitive data candidates calculated from a guessed sub-key and known data such as plaintexts and ciphertexts. This paper enhances CPA to propose a new general power analysis, built-in determined sub-key CPA (BS-CPA), which finds a new sub-key by using the previously determined sub-keys recursively to compute the sensitive data candidates and to increase the signal-to-noise ratio in its analysis. BS-CPA also reuses the power traces in the repetitions of finding sub-keys to decrease the total number of the required traces for determining the all sub-keys. BS-CPA is powerful and effective when the multiple sensitive data blocks such as sbox outputs are processed simultaneously as in the hardware implementation. We apply BS-CPA to the power traces provided at the DPA contest and succeed in finding a DES key using fewer traces than the original CPA does.
- 2010-09-01
著者
-
KOMANO Yuichi
Toshiba Corporation
-
SHIMIZU Hideo
Toshiba Corporation
-
Kawamura Shinichi
Research Center For Information Security Advanced Industrial Science And Technology
-
Shimizu Hideo
Toshiba Corporate R & D Center
-
Komano Yuichi
Toshiba Corp. Kawasaki‐shi Jpn
関連論文
- BS-CPA: Built-In Determined Sub-Key Correlation Power Analysis
- Toward the Fair Anonymous Signatures : Deniable Ring Signatures(Signatures,Cryptography and Information Security)
- On the Security of Nested SPN Cipher against the Differential and Linear Cryptanalysis(Special Section on Cryptography and Information Security)
- Provably Secure Untraceable Electronic Cash against Insider Attacks(Discrete Mathematics and Its Applications)
- Fair Exchange of Signatures with Multiple Signers(Discrete Mathematics and Its Applications)
- Solutions to Security Problems of Rivest and Shamir's Pay Word Scheme(Application)(Cryptography and Information Security)
- Provably Secure Multisignatures in Formal Security Model and Their Optimality
- Taxonomical Security Consideration of OAEP Variants(Discrete Mathematics and Its Applications)
- BS-CPA : Built-In Determined Sub-Key Correlation Power Analysis
- Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform