删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

运用t检验评估3DES算法的侧信道信息泄露

清华大学 辅仁网/2017-07-07

运用t检验评估3DES算法的侧信道信息泄露
陈佳哲, 李贺鑫, 王亚楠, 王宇航
中国信息安全测评中心, 北京 100085
Evaluating side-channel information leakage in 3DES using the t-test
CHEN Jiazhe, LI Hexin, WANG Yanan, WANG Yuhang
China Information Technology Security Evaluation Center, Beijing 100085, China

摘要:

输出: BibTeX | EndNote (RIS)
摘要t检验是统计学中用来检验2个未知方差正态总体均值关系的假设检验方法。当总体的方差不相等, 且样本量也不相等时, Welch t检验是一种比Student's t检验更可靠的方法。该文将借鉴采用t检验对AES的实现进行侧信道信息泄露评估的方法, 用Welch t检验来对3DES算法运行过程中的侧信道信息泄露进行评估, 以衡量其是否可能受到一阶DPA攻击。该文构造了适合于3DES算法的Welch t检验方法, 并对实现方法不同的3个运行3DES算法的设备进行了实验。实验结果表明该文的方法是有效的。
关键词 Welch t检验,3DES算法,侧信道,信息泄露评估
Abstract:The t-test is a hypothesis test that deals with two Gaussian samples with unknown variances. When the two samples have unequal variances and unequal sample sizes, the Welch t-test is more reliable than the Student's t-test. This paper evaluates the 1st order side-channel information leakage of 3DES with an AES type t-test. Welch t-tests suitable for evaluating 3DES are given with tests on three different devices that show this method is effective.
Key wordsWelch t-test3DES algorithmside-channelinformation leakage evaluation
收稿日期: 2016-01-24 出版日期: 2016-05-19
ZTFLH:TN918
引用本文:
陈佳哲, 李贺鑫, 王亚楠, 王宇航. 运用t检验评估3DES算法的侧信道信息泄露[J]. 清华大学学报(自然科学版), 2016, 65(5): 499-503.
CHEN Jiazhe, LI Hexin, WANG Yanan, WANG Yuhang. Evaluating side-channel information leakage in 3DES using the t-test. Journal of Tsinghua University(Science and Technology), 2016, 65(5): 499-503.
链接本文:
http://jst.tsinghuajournals.com/CN/10.16511/j.cnki.qhdxxb.2016.25.007 http://jst.tsinghuajournals.com/CN/Y2016/V65/I5/499


图表:
图1 DES算法的轮运算
表1 设备D1的检验结果
图2 对设备D1第1个5万条曲线的检验1中所有32个比特在所有时间点的t值
表2 设备D2的检验结果
图3 设备D2第2个5万条曲线的检验4中 所有32个比特在所有时间点的t值
图4 设备D3的3DES算法的电磁信号曲线
表3 设备D3的检验结果
图5 对设备D3第1个5万条曲线的 检验8中的所有结果的t值


参考文献:
[1] Kocher P, Jaffe J, Jun B. Differential power analysis[C]//Proc CRYPTO'99. Berlin Heidelberg:Springer-Verlag, 1999:388-397.
[2] Kocher P. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems[C]//Proc CRYPTO'96. Berlin Heidelberg:Springer-Verlag, 1996:104-113.
[3] CCMB-2012-09-001. Common Criteria for information technology security evaluation[S/OL]. (2012-09). http://www.commoncriteriaportal.org/cc/.
[4] CCMB-2012-09-001. Common methodology for information technology security evaluation[S/OL]. (2012-09). http://www.commoncriteriaportal.org/files/ccfiles/CEMV3.1R4.pdf.
[5] CCDB-2013-05-002. Supporting document-mandatory technical document:application of attack potential to smartcards[S/OL]. (2013-05). http://www.commoncriteriaportal.org/files/supdocs/CCDB-2013-05-002.pdf.
[6] Mather L, Oswald E, Bandenburg J, et al. Does my device leak information? An a priori statistical power analysis of leakage detection tests[C]//Proc Advances in Cryptology-ASIACRYPT 2013. Berlin Heidelberg:Springer-Verlag, 2013:486-505.
[7] Goodwill G, Jun B, Jaffe J, et al. A testing methodology for side channel resistance validation[C]//Proc NIAT 2011. Gaithersburg:NIST, 2011.
[8] Jaffe J, Rohatgi P, Witteman M. Efficient side-channel testing for public key algorithms:RSA case study[C]//Proc NIAT 2011. Gaithersburg:NIST, 2011.
[9] Easter R, Quemard J-P, Sakurai G. ISO/IEC DIS 17825:Information technology-Security technique-Testing methods for the mitigation of non-invasive attack classes against cryptographic modules[Z]. Berlin:DIN, 2014-12-01.
[10] Chothia T, Guha A. A statistical test for information leaks using continuous mutual information[C]//Proc Computer Security Foundations Symposium (CSF). Piscataway, NJ:IEEE Press, 2011:177-190.
[11] Chatzikokolakis K, Chothia T, Guha A. Statistical measurement of information leakage[C]//Proc Tools and Algorithms for the Construction and Analysis of Systems. Berlin Heidelberg:Springer-Verlag, 2010:390-404.
[12] EMV. Integrated Circuit Card Specifications for Payment Systems[S]. California:EMVCo, 2011.
[13] FIPS PUB 46-3. The Official Document Describing the DES Standard[S]. Gaithersburg:NIST, 1999.
[14] Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model[C]//Proc CHES 2004. Berlin Heidelberg:Springer-Verlag, 2004:16-29.


相关文章:
[1]任燕婷, 乌力吉, 李翔宇, 王安, 张向民. 抗攻击低功耗RSA处理器设计与实现[J]. 清华大学学报(自然科学版), 2016, 56(1): 1-6.

相关话题/检验 信息 实验 设计 统计