Side channel attack on RSM (Rotating S-box Masking)

سال انتشار: 1398
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 544

فایل این مقاله در 12 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ITCT07_002

تاریخ نمایه سازی: 2 دی 1398

چکیده مقاله:

Cryptography was created to prevent unauthorized access to sensitive information, thus it causes to generate a variety of cryptographic algorithms. In each encryption algorithm, there is a key that encoder only has it. This key is used to reverse encryption and so-called decryption. Advanced Encryption Standard (AES) is a symmetric cryptographic algorithm. Various attacks have been performed on the AES encryption algorithm such as differential power analysis (DPA). Differential power analysis attack finds the key by using the relationship between power consumption and intermediate data. To prevent this attack, many countermeasures have been presented such as masking. This countermeasure removes the relationship between power consumption and intermediate data by masking the intermediate data. In this research, we presented a new approach that can break the RSM countermeasure using the DPA attack. In fact, by using the pattern recognition algorithms, the trace with the same mask are grouped into distinct categories, and then, with the DPA attack, can be guessed the mask in addition to the key. So, in this way can be attacked to RSM.

نویسندگان

Mojtaba Gazmeh

Department of Computer Engineering, Shahed University, Tehran, Iran

Mohammad Ali Doostari

Department of Computer Engineering, Shahed University, Tehran, Iran