Efficient Random Number for the Masking Method against DPA Attacks

M. Yoshikawa,Y. Kojima

Systems Engineering(2011)

引用 4|浏览3
暂无评分
摘要
Security LSI which is implemented on IC cards conducts the encryption processing to protect confidential information such as cipher keys. In the encryption, encryption standards such as DES algorithm and AES algorithm are widely used and are theoretically secured. However, when these encryption standards are incorporated into electronic devices, it is reported to be possible to estimate the confidential information by analyzing the secondary information such as power consumption during the circuit's operation. The transformed masking method is a typical measure against this attack at the algorithm level. In this method, adding random numbers to intermediate data of encryption masks the correlation between power consumption and confidential information. The transformed masking method is effective for hamming weight attack that focuses on the bit value. This study clarifies random numbers used in the transformed masking method that are effective for this attack. Experimental results show the validity of the proposed method.
更多
查看译文
关键词
encryption standard,masking method,secondary information,aes algorithm,power consumption,encryption mask,encryption processing,dpa attacks,random number,confidential information,efficient random number,correlation,side channel attacks,resistance,information security,encryption,cryptography,tamper resistance,differential power analysis,hamming weight
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要