Font Size: a A A

Research And Implementation Of Side Channel Attack And Countermeasure

Posted on:2013-05-19Degree:DoctorType:Dissertation
Country:ChinaCandidate:C H SunFull Text:PDF
GTID:1228330395957132Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Side-channel attacks and their countermeasures are active research areas incryptography. The side-channel attack is a kind of attack based on the cryptosystemimplementation, which makes full use of the dependency between the leakageinformation and the confidential information of the cryptosystem in the actual operationto achieve attacking. Also, it can combine traditional cryptanalysis attacks or manykinds of side-channel attacks to achieve extremely strong attack power. Theimplementation of side-channel attacks has already been a serious threat to the securityof the practical cryptosystem.The electromagnetic attack is one kind of side-channel attacks, and it needs noelectrical connection to the target of attack. The area selectivity of electromagneticradiation can defeat some countermeasures. In this paper, the side-channel attack andcountermeasures were presented on the basis of common cryptosystems. Someimportant results were achieved:1. According to the features of the S-box of the ultra lightweight block cipherPRESENT, a double differential electromagnetic attack method was presented,which can analyze both the output of the S box and that of the XOR operation.Experiment results imply that these two attack points confirm and supplement witheach other, which compensates for the case that it may not get the wholeconfidential key when only using the single location attack in practice.2. By analysising the relation between the peak of the differential electromagneticattack and the attacking position, it follows that mean difference peaked when itoperated with the maximum hamming distance on the output of the attacking point.By this conclusion, a software countermeasure for the electromagnetic analysis waspresented.3. Through the research focusing on both the structural features and the software andhardware implementation of block cipher, a hybrid side-channel attack method,namely fault-electromagnetic attack, was presented. Using this method to attack theblock cipher, the round is reduced or reduced to lowest. Additionally, thecountermeasure for the fault-electromagnetic method was proposed, through which faults-electromagnetic attack risks can effectively be prevented or reduced.4. In view of analysising the current widely used RFID access control system, a kindof specific attack process was proposed. Through the test and analysis, we points outa vulnerability of this kind of access control system, that cloning attack can realizean invasion easily. Furthermore, considering the reality and cost factors, the securitymechanism against the cloning attack of RFID cards associated with physicalfeatures was presented. The experiment result indicates that this method can identifythe forged RFID cards and reduce the risk of the access control system.
Keywords/Search Tags:Side-channel attack, Differential-electromagnetic attack, Block cipher, RFID
PDF Full Text Request
Related items