关键词: 高级加密标准/
光辐射分析攻击/
密码芯片/
汉明重量
English Abstract
Attack on the advanced encryption standard cipher chip based on the correspondence between Hamming weight and the number of emitted photons
Wang Hong-Sheng1,Xu Zi-Yan1,
Zhang Yang1,
Chen Kai-Yan1,
Li Bao-Chen1,
Wu Ling-An2
1.Department of Information Engineering, Ordnance Engineering Collage, Shijiazhuang 050003, China;
2.Institute of Physics and Beijing National Laboratory for Condensed Matter Physics, Chinese Academy of Sciences, Beijing 100190, China
Fund Project:Project supported by the National Natural Science Foundation of China (Grant No. 51377170, 11304007), and the Natural Science Foundation of Hebei, China (Grant No. F2012506008).Received Date:26 January 2016
Accepted Date:04 March 2016
Published Online:05 June 2016
Abstract:The security of information transmission is of paramount importance in all sectors of society, whether civilian or defence related. In ancient times the encryption of secret messages was mainly realized by physical or chemical means, but this was later supplemented by mathematical techniques. In parallel, the breaking of enemy codes has also been a subject of intense study. To date, the only known absolutely secure means of encryption is through quantum cryptography, However, this still has to be implemented by equipment that is vulnerable to various physical attacks, so it is important to study these methods of attack, both for legitimate users and for the surveillance of criminal activities. Today, nearly all transactions have to be realized through the computer and much effort has been devoted to cracking the software. However, little attention has been paid to the hardware, and it has only recently been realized that computer chips themselves can leak sensitive information, from which a code may even be deciphered.By studying the photonic emission and the data dependency of a cryptographic chip during operation, the correspondence between the Hamming weight of the operand and the number of photons emitted may be established, based on which a simple and effective method is proposed to crack the Advanced Encryption Standard (AES) cipher chip. An experimental platform has been set up for measuring and analyzing the leaked photonic emission using time-correlated single-photon counting. An AT89C52 microcontroller implementing the operation of the AES cipher algorithm is used as a cipher chip. The emitted photons are collected when the first AddRoundKey and SubBytes of the AES encryption arithmetic are executed, and their respective numbers are found to have a linear relationship with the operand Hamming weight. The sources of noise affecting the photon emission trace have been analyzed, so that the measurement error and uncertainty can be reduced effectively. With the help of our Hamming weight simulation model, by selecting one or several groups of plain text and comparing the corresponding relationship between the Hamming weight of the intermediate values and the number of photons emitted by the cipher chip, the key of the AES encryption algorithm has been successfully recovered and cracked. This confirms the effectiveness of this method of attack, which can therefore pose a severe threat to the security of the AES cipher chip. For the next step in the future, our method will be optimized to narrow the search range, and also combined with other photonic emission analysis attacks (such as simple photonic emission analysis and differential photonic emission analysis) to improve the efficiency. A comparison and evaluation of the various methods will be made. At the same time, our current experimental configuration will be improved to obtain a better collection efficiency and signal-to-noise ratio.
Keywords: advanced encryption standard/
photonic emission analysis attack/
cryptographic chip/
Hamming weight