원문정보
Performance Improvement of Power attack with Truncated Differential Cryptanalysis
초록
영어
In 1989, Kocher et al. introduced Differential Power Attack on block ciphers. This attack allows to extract secret key used in cryptographic computations even if these are executed inside tamper-resistant devices such as smart card. Since 1989, many papers were published to improve resistance of DPA. At FSE 2003 and 2004, Akkar and Goubin presented several masking methods to protect iterated block ciphers such as DES against Differential Power Attack. The idea is to randomize the first few and last few rounds(3 ~ 4 round) of the cipher with independent random masks at each round and thereby disabling power attacks on subsequent inner rounds. This paper show how to combine truncated differential cryptanalysis applied to the first few rounds of the cipher with power attacks to extract the secret key from intermediate unmasked values.
목차
I. 서론
II. DES 에 적용한 Unique Masking Method
III. 차분분석을 적용한 전력분석 공격
IV. 부정차분분석을 적용한 전력분석 공격
V. 시뮬레이션
VI. 결론
참고문헌