Font Size: a A A

Research On Collision Power Analysis Attack And Design And Implementation Of The Visible Subsystem

Posted on:2017-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:G L YangFull Text:PDF
GTID:2308330485960747Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Crypto algorithms usually exist in crypto devices in forms of software or hardware. Different types of side channel leakages, such as power consumption, electromagnetic emanation, and timing information exist when a crypto device is in operation. One can use side channel leakages of a crypto device to recover the secret key used by a crypto device, and such attacks are called as side channel attacks. Side channel attacks pose serious threat on the physical security of crypto devices. This thesis focuses on the side channel attack on crypto algorithms and crypto devices whose implementation details are not fully known, and the author implements the visible subsystem of the side channel cryptanalysis and test system.The main work and contribution of this thesis are as follows:(1) Proposed one cross collision power analysis attackAs one typical side channel attack method, one usually assumes in power analysis attacks that the crypto algorithms and the crypto devices details are fully known. However, when the algorithms and the devices details are unknown, this type of attack loses its effect. Only a very few related works are about power analysis attacks on crypto devices whose implementation are unknown. Among them, blind attack assumes that one can rewrite the key used by the reference device. Obviously, when the secret key cannot be rewritten, it is hard to implement blind attack. In light of this, this thesis researches the power analysis attack exporting the cross collision structure of crypto algorithms. In this attack, one has a certain amount of crypto devices whose keys are known and cannot be rewritten and one does not fully know the algorithm and implementation details of the crypto devices. In detail, if crypto algorithms contain one structure that satisfying the property of value invariance when the plaintext and the key are interchanged, we call this structure as the cross collision structure. For example, the S-box of AES and PRESENT all satisfy such property. Based on this, the author in this thesis proposes one cross collision power analysis attack. Finally, the author verifies the correctness and effectiveness of this method on the unprotected software implementation of AES-128.(2) Designed and implemented the visible subsystem of the side channel cryptanalysis and test systemAs one important research direction in cryptography, side channel attacks belong to the practice related subject. For the convenience of cross collision power analysis attacks research, the author implements the side channel cryptanalysis and test system visible subsystem. The author exploits the independently developed built-in plotting library to fulfill all kinds of visible operations. At the same time, the subsystem also provides the function of using the third party controller to fulfill the plotting. Users can manually fulfill the whole side channel cryptanalysis process, such as the loading, preprocessing, attacking, evaluating of side channel data without having to write programs. In order to support flexible self-defined plotting library, the subsystem provides unified plotting interface. Additionally, professional users can extend some special plotting functions of the subsystem using script languages.
Keywords/Search Tags:Side Channel Cryptanalysis, Power Analysis Attacks, Blind Attack, Cross Collision
PDF Full Text Request
Related items