請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/3785
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 鄭振牟 | |
dc.contributor.author | Gi-Siu Tong | en |
dc.contributor.author | 童御修 | zh_TW |
dc.date.accessioned | 2021-05-13T08:36:45Z | - |
dc.date.available | 2016-08-24 | |
dc.date.available | 2021-05-13T08:36:45Z | - |
dc.date.copyright | 2016-08-24 | |
dc.date.issued | 2016 | |
dc.date.submitted | 2016-08-08 | |
dc.identifier.citation | [APSQ06] Cédric Archambeau, Eric Peeters, François-Xavier Standaert, and JeanJacques Quisquater. Template attacks in principal subspaces. In CHES, volume 4249 of Lecture Notes in Computer Science, pages 1-14. Springer, 2006.
[BAK98] Eli Biham, Ross J. Anderson, and Lars R. Knudsen. Serpent: A new block cipher proposal. In FSE, volume 1372 of Lecture Notes in Computer Science, pages 222-238. Springer, 1998. [BCJ07] Gregory V. Bard, Nicolas Courtois, and Chris Jefferson. Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over GF(2) via sat-solvers. IACR Cryptology ePrint Archive, 2007:24, 2007. [BCO04] Eric Brier, Christophe Clavier, and Francis Olivier. Correlation power analysis with a leakage model. In CHES, volume 3156 of Lecture Notes in Computer Science, pages 16-29. Springer, 2004. [BGK04] Johannes Blömer, Jorge Guajardo, and Volker Krummel. Provably secure masking of AES. In Selected Areas in Cryptography, volume 3357 of Lecture Notes in Computer Science, pages 69-83. Springer, 2004. [CK13] Omar Choudary and Markus G. Kuhn. Efficient template attacks. In CARDIS, volume 8419 of Lecture Notes in Computer Science, pages 253-270. Springer, 2013. [CRR02] Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. Template attacks. In CHES, volume 2523 of Lecture Notes in Computer Science, pages 13-28. Springer, 2002. [Dev16] The Sage Developers. SageMath, the Sage Mathematics Software System (Version 7.1), 2016. http://www.sagemath.org. [DPRS11] Julien Doget, Emmanuel Prouff, Matthieu Rivain, and François-Xavier Standaert. Univariate side channel attacks and leakage modeling. J.Cryptographic Engineering, (2):123-144, 2011. [GBTP08] Benedikt Gierlichs, Lejla Batina, Pim Tuyls, and Bart Preneel. Mutual information analysis. In CHES, volume 5154 of Lecture Notes in Computer Science, pages 426-442. Springer, 2008. [GSM +10] Sylvain Guilley, Laurent Sauvage, Julien Micolod, Denis Réal, and Frédéric Valette. Defeating any secret cryptography with SCARE attacks. In LATINCRYPT, volume 6212 of Lecture Notes in Computer Science, pages 273-293. Springer, 2010. [HTM09] Neil Hanley, Michael Tunstall, and William P. Marnane. Unknown plaintext template attacks. In WISA, volume 5932 of Lecture Notes in Computer Science, pages 148-162. Springer, 2009. [JCCC07] Ming-Haw Jing, Zih-Heng Chen, Jian-Hong Chen, and Yan-Haw Chen. Reconfigurable system for high-speed and diversified AES using FPGA. Microprocessors and Microsystems, 31(2):94-102, 2007. [JPS05] Marc Joye, Pascal Paillier, and Berry Schoenmakers. On second-order differential power analysis. In CHES, volume 3659 of Lecture Notes in Computer Science, pages 293-308. Springer, 2005. [KJJ99] Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In CRYPTO, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, 1999. [MBZ +12] Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, and Michael Walter. Improved algebraic side-channel attack on AES. IACR Cryptology ePrint Archive, 2012:84, 2012. [MOP07] Stefan Mangard, Elisabeth Oswald, and Thomas Popp. Power analysis attacks - revealing the secrets of smart cards. Springer, 2007. [MPO05] Stefan Mangard, Norbert Pramstaller, and Elisabeth Oswald. Successfully attacking masked AES hardware implementations. In CHES, volume 3659 of Lecture Notes in Computer Science, pages 157-171. Springer, 2005. [Nov03] Roman Novak. Side-channel attack on substitution blocks. In ACNS, volume 2846 of Lecture Notes in Computer Science, pages 307-318. Springer, 2003. [NRR06] Svetla Nikova, Christian Rechberger, and Vincent Rijmen. Threshold implementations against side-channel attacks and glitches. In ICICS, volume 4307 of Lecture Notes in Computer Science, pages 529-545. Springer, 2006. [RS05] A.G. Rostovtsev and O.V. Shemyakina. Aes side channel attacks protection using random isomorphisms. Cryptology ePrint Archive, Report 2005/087, 2005. http://eprint.iacr.org/. [RSV09] Mathieu Renauld, François-Xavier Standaert, and Nicolas VeyratCharvillon. Algebraic side-channel attacks on the AES: why time also matters in DPA. In CHES, volume 5747 of Lecture Notes in Computer Science, pages 97-111. Springer, 2009. [SAT16 ] Sat competition web page, 2016. Available at http://www.satcompetition.org/. [Soo16a] Mate Soos. Cryptominisat 5.0, 2016. Available at https://github.com/msoos/cryptominisat. [Soo16b] Mate Soos. Xor clauses, 2016. Available at http://www.msoos.org/xor-clauses/. [VMKS12] Nicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof, and François-Xavier Standaert. Shu¬ing against side-channel attacks: A comprehensive study with cautionary note. In ASIACRYPT, volume 7658 of Lecture Notes in Computer Science, pages 740-757. Springer, 2012. [Wik16a] Wikipedia. Advanced encryption standard process, 2016. [Online; accessed 7-July-2016]. [Wik16b] Wikipedia. Boolean satisfiability problem, 2016. [Online; accessed 7-July-2016]. [WSH +10] Mao-Yin Wang, Chih-Pin Su, Chia-Lung Horng, Cheng-Wen Wu, and Chih-Tsun Huang. Single- and multi-core configurable AES architectures for flexible security. IEEE Trans. LSI Syst., 18(4):541-552, 2010. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/3785 | - |
dc.description.abstract | 旁通道分析對密碼裝置的實作是一個強大的威脅,而差分能量分析是旁通道分析中的一個以高效率而聞名的分支。然而,當差分能量分析被應用在演算法中有未知替換盒的情況時,它會因為需要列舉過多的替換盒可能性而無法達成。本文使用代數旁通道分析來處理未知替換盒的問題。結果顯示,若存在一個模板能提供旁通道資訊,則代數旁通道分析可成功取得Serpent演算法的未知替換盒及回合密鑰。 | zh_TW |
dc.description.abstract | Side-Channel Analysis (SCA) is a powerful threat against the implementation of cryptographic devices. And Differential Power Analysis (DPA) is a popular type of SCA because of its efficiency. However, when applying DPA to an algorithm with unknown S-Box, DPA could not work well due to the large enumerating space of S-Box. In this thesis, we use Algebraic Side-Channel Analysis (ASCA) to deal with the unknown S-Box problem. The result shows that the unknown S-Boxes and secret round keys of Serpent can be retrieved if a template which provides the side-channel information is given. | en |
dc.description.provenance | Made available in DSpace on 2021-05-13T08:36:45Z (GMT). No. of bitstreams: 1 ntu-105-R03921075-1.pdf: 971964 bytes, checksum: 52d1b7c4a534d7838a5bc741573bb54b (MD5) Previous issue date: 2016 | en |
dc.description.tableofcontents | 1 Introduction 1
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.4 Roadmap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 Preliminaries 5 2.1 Template Attacks (TA) . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1.1 Template Building . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.2 Template Matching . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2 Boolean Satisability Problem (SAT) . . . . . . . . . . . . . . . . . . 7 2.3 Serpent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3 Algebraic Side-Channel Analysis 10 3.1 Problem Denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.2 The Algebraic Representation of the S-Box . . . . . . . . . . . . . . . 11 3.3 Represent the Intermediate Values by Unknown Variables . . . . . . . 12 3.4 Introduce the Hamming Weight Information . . . . . . . . . . . . . . 15 3.5 Convert to the CNFs . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.6 Solve the CNF by SAT solver . . . . . . . . . . . . . . . . . . . . . . 19 4 Experiments 21 4.1 Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 4.2 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 5 Conclusion 24 5.1 Future Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Bibliography 26 | |
dc.language.iso | en | |
dc.title | 未知替換盒之旁通道分析 | zh_TW |
dc.title | Side-Channel Analysis of Unknown S-Boxes | en |
dc.type | Thesis | |
dc.date.schoolyear | 104-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 楊柏因,謝致仁 | |
dc.subject.keyword | 旁通道攻擊,代數旁通道分析,未知替換盒,Serpent 加密演算法, | zh_TW |
dc.subject.keyword | Side-Channel Attacks,Algebraic Side-Channel Analysis,Unknown S-Box,Serpent, | en |
dc.relation.page | 29 | |
dc.identifier.doi | 10.6342/NTU201602059 | |
dc.rights.note | 同意授權(全球公開) | |
dc.date.accepted | 2016-08-09 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
顯示於系所單位: | 電機工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-105-1.pdf | 949.18 kB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。