Font Size: a A A

Power Analysis Attacks And Protections Against KLEIN

Posted on:2015-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:J H WuFull Text:PDF
GTID:2298330422982045Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, computer technology andmicroelectronics technology, the Internet of things can be found in all areas of our lives. Allkinds of banks cards, bus cards filled with our daily lives. Because the limitation of circuitscale and energy providing, the computing power and storage space of these portablecryptographic equipments is extremely limited. KLEIN is a lightweight block cipheralgorithm proposed in2011, it is higher efficiency and lower resource consumptioncompared with other cipher algorithms.The rapid development of information technology has brought a great convenience toour lives, but at the same time, security problem was increasingly severe. Traditionalcryptography research only concerned about the cipher algorithm used in cryptographicequipment is safe or not on mathematical analysis, but cipher algorithm will finally realizedas cryptographic equipment and run in a real environment, and leaked some physicalinformation inevitably. Collect and analysis these physical information leaked during therunning of cryptographic equipment, we may be possible to find out he key thesecryptographic equipment used. This method is so called side-channel attacks (SCA).Power analysis attacks are the easiest and most effective methods of side-channelattacks. Methods of power analysis attacks can be divided into three kinds: basic methodssuch as simple power analysis attacks and differential power analysis attacks, improvedmethods such as correlation coefficient power analysis attacks (CPA) and mutualinformation power analysis attacks (MIA), and methods for defense technology such ashigher-order correlation coefficient attacks (HOCPA).This article discusses the research significance of power analysis attacks of KLEIN,builds a simulation platform to obtain power consumption data of KLEIN, analysis theencryption process of KLEIN and carry out CPA and MIA against KLEIN, and finallyrealizes masking scheme of KLEIN.
Keywords/Search Tags:KLEIN, CPA, MIA, Masking
PDF Full Text Request
Related items