Suppr超能文献

瞬变电磁多故障的有效仿真分析

An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults.

作者信息

Dong Liang, Zhang Hongxin, Sun Shaofei, Zhu Lei, Cui Xiaotong, Ghosh Bablu K

机构信息

School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China.

Communication and Electronic Engineering Institute, Qiqihar University, Qiqihar 161006, China.

出版信息

Sensors (Basel). 2020 Apr 1;20(7):1976. doi: 10.3390/s20071976.

Abstract

Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient multiple faults. In the fault analysis stage, the adversary is unclear about the actual number of faults injected. Typically, the single-nibble fault analysis encounters difficulties. Therefore, in this paper, we propose novel ciphertext-only impossible differentials that can analyze the number of random faults to six nibbles. We use the impossible differentials to exclude the secret key that definitely does not exist, and then gradually obtain the unique secret key through inverse difference equations. Using software simulation, we conducted 32,000 random multiple fault attacks on Midori. The experiments were carried out to verify the theoretical model of multiple fault attacks. We obtain the relationship between fault injection and information content. To reduce the number of fault attacks, we further optimized the fault attack method. The secret key can be obtained at least 11 times. The proposed ciphertext-only impossible differential analysis provides an effective method for random multiple faults analysis, which would be helpful for improving the security of block ciphers.

摘要

嵌入式加密设备和智能传感器容易受到物理攻击。由于芯片尺寸不断缩小,激光注入、粒子辐射和电磁瞬态注入是引入瞬态多重故障的可能方法。在故障分析阶段,攻击者不清楚实际注入的故障数量。通常,单字节故障分析会遇到困难。因此,在本文中,我们提出了新颖的仅密文不可能差分,它可以将随机故障数量分析到六个字节。我们使用不可能差分来排除肯定不存在的秘密密钥,然后通过逆差分方程逐步获得唯一的秘密密钥。通过软件模拟,我们对Midori进行了32000次随机多重故障攻击。进行这些实验是为了验证多重故障攻击的理论模型。我们获得了故障注入与信息内容之间的关系。为了减少故障攻击的次数,我们进一步优化了故障攻击方法。至少可以11次获得秘密密钥。所提出的仅密文不可能差分分析为随机多重故障分析提供了一种有效方法,这将有助于提高分组密码的安全性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a2e8/7181125/df1c687ee5e6/sensors-20-01976-g001.jpg

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验