摘要(英) |
Many defensive countermeasures have been proposed by many algorithms since Differential Powder Analysis (DPA) attack was announced. For secure AES algorithm, there was weakness of second-order DPA in the proposed Masking method. In this paper, the effective AES software, which masks plain-text twice, the other to replace primitive S-Box to makes a defense against second-order DPA, is proposed. The algorithm needn’t use the Masking method to modify S-Box. Therefore, program’s complexity with encryption isn’t increased; to replace the primitive S-Box is called “random S-Box”. In fact, this random S-Box produces the same method as this primitive S-Box does. Finally, in order to prove that it can resist DPA attack, the defensive effect of 8051 micro-controller is shown. Hence, the proposed resistant method also suits the low-cost smart card. |
參考文獻 |
[1]Paul Kocher, Joshua Jaffe, and Benjamin Jun “Differential Power Analysis”, Advances in Cryptographt-CRYPTO’99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
[2]曾紹崟,呂誌忠,戴憲文,孫熒聯,王煥文,彭志毅,林慧菁“Jixco 簡介”,專題報導 ─ IC卡應用安全管理,Communications of the CCISA Vol.8 No.3 June 2002, P68~78.
[3]K.Itoh, M.Takenaka, and N.Torii,“DPA Countermeasure Based on the Masking Method”, ICICS 2001, LNCS 288, pp.440-456, Springer-Verlag, 2002.
[4]Joan Daemen,Vincent Rijmen, “AES proposal:Rijndael.”,1999,
available at Web http://csrc.nist.gov/encryption/aes/ rijndael/ Rijndael.pdf
[5]Paul Kocher,Joshua Jaffe,and Benjamin Jun “Introduction Differential Power Analysis and Related Attacks”1998 Available at http://www.cryptography.com/dpa/technical
[6]S.M.Yen,“Amplified Differential Power Crytanalysis on Rijndael Implementations with Exponentially Fewer Power Traces”, Information Security and Privacy-ACISP 2003, LNCS 2727, pp.106-117, Springer-Verlag, 2003.
[7]Jean-Jacques Quisquater, David Samyde,“Automatic Code Recognition for Smartcards Using a Kohonen Neural Network”, USENIX Association,Proceedings of the Fifth Smart Card Research and Advanced Application Conference (CARDIS 02), San Jose,CA,USA,November 2002, http://www.usenix.org/
events/cardis02/ full_papers/valverde/valverde.pdf
[8]T.Messerges,“Using Second-Order Power Analysis to Attack DPA Resistant Software”, CHES 2000, LNCS 1965, pp.238-351, Springer-Verlag, 2000. |