Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
スポンサーリンク
概要
- 論文の詳細を見る
This paper shows two power analysis attacks against a software implementation of a first-order DPA resistant S-box algorithm that is based on the discrete Fourier Transform (DFT). The DPA resistant S-box algorithm based on DFT was proposed by Prouff et al. in 2006 and improved by Coron et al. in 2008, respectively. In our attacks against the improved one, we pre-process the power traces by separating them into two subgroups, so that each has a biased mask. For the separated power traces, two post analysis methods are proposed to identify the key. One is based on DPA attack against one subgroup, and the other utilizes the difference of means for two subgroups and a pattern matching. Finally, we compare these two attack methods and propose an algorithm-level countermeasure to enhance the security of S-box calculation based on the DFT.
論文 | ランダム
- D-22 歯周疾患とストレスの関係についての研究 第3報 : 咬合機能異常者におけるYGの類型別分布について
- 社会的参照現象における他者の被参照知覚--新たな視点
- 後期中等段階の数学カリキュラムの国際比較
- 肺・気道よりの抗原吸収--肉芽腫性病変肺における経気道感作抗原の生体内分布
- PMSM用改良型ACFO速度センサレス方式におけるデッドタイム電圧誤差補償と電機子抵抗同定