Font Size: a A A

The Research Of Enhanced Side-channel Attack And New Cryptographic Algorithmsits

Posted on:2014-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:Q SongFull Text:PDF
GTID:2268330425483694Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
In today’s information society, cryptography has been widely used in the government, themilitary, financial, defense and other fields which is also closely related to the confidentialityof personal information, these promoted the development of cryptography research.Advanced encryption standard (AES) is select as data encryption standard in2001and newgeneration of Hash algorithm, SHA-3, was selected in2012.This article has analyzed the basic concept and characteristics of the AES and SHA-3algorithms, and studied the new Side Channel Attack (SCA) whichcombines the algebraicattack and DPA attack together. Compared with the DPA attacks using HD model with S-boxof AES, the one using HD model with algebraic expressionof S-box can recover keyinformationquickly. Besides, this article realized an unified interface for the five candidateimplementations of SHA-3in the FPGA and ASIC hardware platforms. Majorcontribution forthis article are as follows:Firstly, this article verifies the correctness of DPA attack using the Hamming Distancemodel. SASEBO-GII evulation board was used to gather the real power traces of AES, and themaximum correlation of the gueesed key value was computed. Experimental results show thatthe real private could be retrieve d from the above setups..Secondly, a new SCA attack combiniting algebraic and DPA attacks was proposedwhichuses the algebraic expression for S-box in AES to replace the original S-boxtable. This newtechnology has the advantages of higher accuracy, lower area consumption, and the strongerstability. It overcomes the shortcoming of the existing DPA attack and strengthens SCA attacksto AES.Finally, this article realizes the unified interface of five SHA-3candidate algorithms onXilinx Virtex-5FPGA and ASIC platform. The experimental results indicate that the proposeddesign could provide a flexible option for the users to choose among the fivealgorithmswithout affecting the size, throughput, frequency and power consumption.
Keywords/Search Tags:Block encryption, SHA-3, AES, DPA attack, Algebra bypass attack, Uniforminterface, FPGA, ASIC
PDF Full Text Request
Related items