Font Size: a A A

Research On Key Technologies Of Side Channel Analysis Optimization

Posted on:2019-03-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y G LiFull Text:PDF
GTID:2428330545486912Subject:Information security
Abstract/Summary:PDF Full Text Request
The encryption algorithm used by physical devices is secure at the theoretical level,but the implementation of the algorithm or the improper use of the device will also affect its security.Side channel analysis utilizes the above-mentioned defects of physical equipment and achieves the purpose of destroying the security of the equipment by collecting and analyzing the side channel information of the physical equipment.Several effective contermeasures against side channel analysis have also been proposed by researchers.One of the most representative is masking.Masking blocks the connection between the data and the side channel information by randomizing the data processed by the physical device.The side channel analysis method for masking is one of the current hotspots.The side channel analysis scheme usually includes multiple steps.Any defect will affect the effectiveness of the entire analysis process.In view of this,this thesis analyzes several key steps in the side channel analysis and proposes optimization solutions or new analysis methods.Using the methods described in this thesis can significantly increase the effectiveness of the overall side-channel analysis process.The key technologies studied in this thesis mainly focus on Non-profiling analysis methods.The key technologies in this type of methods include leakage models,pre-processing methods and analysis methods.Firstly,in terms of the leakage model,this thesis thoroughly studies the defects of the existing simulation leakage model.By studying the impact of different simulation levels on the effectiveness of the leakage model,an optimization scheme of the simulation leakage model is proposed,which can significantly improve the effectiveness of the existing leakage model.Secondly,with respect to the preprocessing method,this thesis deeply studies the defects of the combination function and proposes a combined function optimization method.Finally,for the analysis method,this thesis studies the influence of the working frequency on the security of the hardware encryption device,and proposes a frequency security analysis method,which can be used to analyze the side channel security of the hardware encryption device when working at different operating frequencies.
Keywords/Search Tags:Side-channel Analysis, Higher-order Mask, Leakage Model, Combination Function, Leakage Analysis Method
PDF Full Text Request
Related items