Phân tích, đánh giá hiệu quả các phương pháp mặt nạ chống tấn công DPA cho AES trên Smart Card
DOI:
https://doi.org/10.54654/isj.v1i11.91Keywords:
Differential power analysis attack, AES, Smart Card, Embedded mask, FREMTóm tắt
Tóm tắt—Mặt nạ sử dụng giá trị ngẫu nhiên để che giá trị trung gian của thuật toán là phương pháp hiệu quả chống tấn công DPA. Có nhiều giải pháp mặt nạ cho thuật toán AES với mức độ an toàn và hiệu quả khác nhau. Bài báo phân tích, đánh giá ưu, nhược điểm, khả năng ứng dụng của các giải pháp này khi thực thi trên Smart Card. Đồng thời, đề xuất kỹ thuật mặt nạ nhúng, triển khai ứng dụng, đánh giá hiệu quả và khả năng chống tấn công DPA trên Smart Card.
Abstract—Masking with the use of random values to mask the algorithm's intermediate value is an effective method to prevent DPA attacks. There are many masking solutions for AES algorithm with different levels of safety and effectiveness. The article analyzes and assesses advantages and disadvantages, the applicability of these solutions when implemented on Smart Card. Also, proposes embedded mask techniques, application deployment, evaluation of the effectiveness and resistance to DPA attacks on Smart Card.
Downloads
References
[1] Nguyễn Hồng Quang, “Phân tích tiêu thụ điện năng của thiết bị mật mã”, Tạp chí nghiên cứu Khoa học và Công nghệ Quân sự, vol. 34 12/2014, pp 87-93, 2014.
[2] Nguyễn Thanh Tùng, “Một giải pháp chống tấn công DPA hiệu quả”, Tạp chí nghiên cứu Khoa học và Công nghệ Quân sự, vol. 5/2017, pp 33-41, 2017.
[3] Nguyễn Thanh Tùng, Trần Ngọc Quý, “Mặt nạ nhân chống tấn công DPA lên AES trên Smart Card”, Tạp chí nghiên cứu khoa học – Đại học Sư phạm Hà Nội, vol. 5/2019.
[4] Nguyễn Thanh Tùng, Bùi Văn Dương, “Một phương pháp hiệu quả chống tấn công DPA lên AES trên Smart Card”, Tạp chí Nghiên cứu Khoa học và Công nghệ Quân sự, 2019.
[5] Kouichi Itoh, Masahiko Takenaka, and Naoya Torii, “DPA countermeasure based on the “masking method”, In KwangjoKim, editor, ICISC, volume 2288 of Lecture Notes in Computer Science, Springer, 2001.
[6] Xiaoan Zhou, Juan Peng anh Liping Guo, “An Improved AES Masking Method Smartcard Implementation for Resisting DPA Attacks”, International Journal of Computer Science, 2013.
[7] P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis”, proceedings of crypto 99, Lecture Notes in Computer Science, vol. 1666, Springer, pp. 388–397, 1999.
[8] National Institute of Standards and Technology (NIST). FIPS-197 “Advanced Encryption Standard”, November, 2001.
[9] Stefan Mangard, Elisabeth Oswald, and Thomas Popp, “Power Analysis Attacks Revealing the Secrets of Smart Cards”, Graz University of Technology Graz, 2007.
[10] Department of the Army Washington DC, “Basic Cryptanalysis” Field Manual 34-40-2, 1990.
[11] Jovan Dj. Golic, Christophe Tymen, “Multiplicative Masking and Power Analysis of AES Cryptographic Hardware and Embedded Systems – CHES 2002, vol. 2523 of Lecture Notes in Computer Science, pp. 198–212, Springer-Verlag, 2003.
[12] M. Akkar and C. Giraud, “An implementation of DES and AES, secure against some attacks”, Springer-Verlag Berlin Heidelberg, 2001
[13] Elena Trichina, Domenico De Seta, and Lucia Germani, “Simplified Adaptive Multiplicative Mask for AES”, Cryptographic Design Center, Gemplus Technology R & DVia Pio Emanuelli 1, 00143 Rome, Italy, 2003.
[14] Johannes Wolkerstorfer, Elisabeth Oswald, and Mario Lamberger, “An ASIC Implementation of the AES Sboxes”, Institute for Applied Information Processing and Communications,
Graz University of Technology, Inffeldgasse 16a, A-8010 Graz, Austria, 2005.
[15] Christof Parr, “Effcient VLSI Architectures for Bit Parallel Computation in Galois Fields” ECE Department, Worcester Polytechnic Institute, 100 Institute Road, Worcester,MA 01609 USA, 1994.
[16] Johannes Blömer, Jorge Guajardo, and Volker Krummel, “Provably Secure Masking of AES”, ResearchGate, 2004.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).