检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:吴克辉[1] 王韬[1] 赵新杰[1] 张金中[1]
机构地区:[1]军械工程学院计算机工程系,河北石家庄050003
出 处:《军械工程学院学报》2011年第2期65-68,共4页Journal of Ordnance Engineering College
基 金:河北省自然科学基金数学研究专项资助项目(08M010)
摘 要:采用面向字节、分而治之的攻击思想,将AES主密钥按字节划分为若干子密钥块,为每个子密钥块的所有候选值搭建Cache计时信息模板,并采集未知密钥AES算法的Cache计时信息,使Pearson相关性算法与模板匹配,成功地恢复AES-128位密钥。实验结果表明:AES查找表和Cache结构缺陷决定了AES易遭受Cache计时模板攻击,而模板分析理论在时序驱动攻击分析中是可行的。We adopt the byte-oriented and divided-rule principle,and divide the master encryption key into some small encryption key parts under the standard of byte,then build up templates about Cache timing information for the whole candidates of every key part,and gather Cache timing information of unknown-key AES to match with the template through the Pearson correlativity algorithm.Then the full encryption 128-bit key of AES is recovered successfully.Experiment results demonstrate that the AES lookup table and defect of Cache structure decide AES to be vulnerable to this type of attack,and that template analysis theory has strong applicability in timing-driven attack and meanwhile,the analysis method proposed in this paper can be applied to the Cache timing template analysis of other block ciphers with S-box.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.117