Font Size: a A A

Research And Implementation Of Side Channel Energy Attack On BIG

Posted on:2022-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:J X GaoFull Text:PDF
GTID:2518306332967299Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
Side channel analysis technology,especially energy analysis technology,is a common analysis method for cryptographic chips and related equipment.This type of analysis technology provides the possibility of recovering keys to obtain sensitive information,which makes the security of cryptographic chips always under threat.Side channel analysis technology,unlike traditional analysis technology,is an attack method using the characteristics of the cryptographic device instead of the arithmetic characteristics of the cryptographic algorithm,that is,the attacker extracts the power consumption data generated when the cryptographic algorithm executes the encryption process on the device,and uses the characteristics that are closely related to the operand at the current moment,so that to crack the corresponding operand by collecting power consumption data.BIG is a new Feistel structured block cipher.Compared with other block ciphers in terms of hardware or software implementation,BIG has a wider range of usage scenarios and is optimized in terms of encryption/decryption,throughput and area ratio(TP/A).In this paper,the security of the BIG algorithm is analyzed,then the easy-to-use side channel leakage problem in the algorithm itself is discovered,and corresponding defense schemes to enhance its security is proposed.The main research and innovation of this paper are as follows:(1)For the specific implementation of the BIG encryption algorithm without the protection scheme,the research on the related energy analysis attack methods is done on the 8051 singlechip microcomputer platform.According to the selected attack points,the side channel of BIG algorithm is analyzed and the key information is recovered successfully.Then the security of the BIG encryption algorithm is analyzed,and the location of the middle value data is found out,which is the most easily used by the attacker to crack the key.(2)To solve the problem that the side information acquisition before the side channel analysis will produce some noise,an improved related energy analysis method is proposed in this thesis.After collecting the power consumption of the encryption or decryption information leakage of the cryptographic device,the collected energy trace is preprocessed,and the experimental results show that the correlation coefficient of the correct hypothesis key is increased by about 16.1%,so that the correlation energy analysis technology has better performance.(3)Based on security analysis of the BIG algorithm,and in view of the problem that the intermediate data in the algorithm is vulnerable to attack,under the limits of increasing as little burden to the chip as possible,a cyclic shift mask scheme is designed for BIG algorithm,and the energy analysis attack is carried out on the BIG algorithm which is combined with the protection scheme.The simulation result shows that such algorithm can resist CPA attack,and it still has a good protection effect on the real key under the condition of known leakage points.(4)Based on the framework of the Eurocrpt 2009 side-channel attack analysis,the success attack rate and guess entropy are introduced into the security evaluation process of encryption algorithms' anti-energy analysis ability,and a new evaluation method is proposed,and then the anti-attack ability of BIG algorithm with and without a protection scheme are compared by using the proposed evaluation method.The experimental results show that the evaluation method proposed in this paper can obtain the same conclusion as the theoretical analysis,and the efficiency of evaluation calculation is improved compared with the existing methods.
Keywords/Search Tags:Side Channel Analysis, BIG algorithm, Masking, Security Evaluation
PDF Full Text Request
Related items