针对真实RFID标签的侧信道攻击

随着侧信道分析理论的不断发展, 其对缺乏保护的小型密码设备如RFID标签等的威胁也越来越严重. 为了保证数据的安全性, 不少种类的RFID标签可对通讯时的数据进行加密, 然而目前这类RFID标签在软硬件设计上仍然缺乏足够的抗侧信道攻击措施. 为研究在将侧信道分析理论应用于真实RFID标签攻击时的难度和实际攻击效果, 本文选取了近年来新兴的一款具有广阔应用前景的可编程RFID标签(TB-WISP 5.0)进行侧信道攻击. 攻击从目标所运行的简单双向认证协议中的选择明文攻击漏洞入手, 以无触发信号、非侵入式的采集方式获取到了目标运行AES加密时的功耗和电磁泄露轨迹, 并分别利用这两种轨迹, 通过侧...

Full description

Saved in:
Bibliographic Details
Published inJournal of Cryptologic Research Vol. 6; no. 3; p. 383
Main Authors Li, DAI, Gao-Feng, DONG, Hong-Gang, HU, YU Neng-Hai, 戴立, 董高峰, 胡红钢, 俞能海
Format Journal Article
LanguageChinese
Published Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 01.01.2019
Subjects
Online AccessGet full text
ISSN2097-4116
DOI10.13868/j.cnki.jcr.000310

Cover

Abstract 随着侧信道分析理论的不断发展, 其对缺乏保护的小型密码设备如RFID标签等的威胁也越来越严重. 为了保证数据的安全性, 不少种类的RFID标签可对通讯时的数据进行加密, 然而目前这类RFID标签在软硬件设计上仍然缺乏足够的抗侧信道攻击措施. 为研究在将侧信道分析理论应用于真实RFID标签攻击时的难度和实际攻击效果, 本文选取了近年来新兴的一款具有广阔应用前景的可编程RFID标签(TB-WISP 5.0)进行侧信道攻击. 攻击从目标所运行的简单双向认证协议中的选择明文攻击漏洞入手, 以无触发信号、非侵入式的采集方式获取到了目标运行AES加密时的功耗和电磁泄露轨迹, 并分别利用这两种轨迹, 通过侧信道分析理论成功恢复出了其完整的密钥信息. 这一实验结果充分说明了当下加强小型密码设备抗侧信道攻击设计的迫切性和必要性. 之后, 本文给出了在具有低功耗、轻量化、快速计算需求的可编程RFID标签设备上设计抗侧信道分析措施的一些建议.
AbstractList 随着侧信道分析理论的不断发展, 其对缺乏保护的小型密码设备如RFID标签等的威胁也越来越严重. 为了保证数据的安全性, 不少种类的RFID标签可对通讯时的数据进行加密, 然而目前这类RFID标签在软硬件设计上仍然缺乏足够的抗侧信道攻击措施. 为研究在将侧信道分析理论应用于真实RFID标签攻击时的难度和实际攻击效果, 本文选取了近年来新兴的一款具有广阔应用前景的可编程RFID标签(TB-WISP 5.0)进行侧信道攻击. 攻击从目标所运行的简单双向认证协议中的选择明文攻击漏洞入手, 以无触发信号、非侵入式的采集方式获取到了目标运行AES加密时的功耗和电磁泄露轨迹, 并分别利用这两种轨迹, 通过侧信道分析理论成功恢复出了其完整的密钥信息. 这一实验结果充分说明了当下加强小型密码设备抗侧信道攻击设计的迫切性和必要性. 之后, 本文给出了在具有低功耗、轻量化、快速计算需求的可编程RFID标签设备上设计抗侧信道分析措施的一些建议.
Author 胡红钢
俞能海
Li, DAI
Gao-Feng, DONG
戴立
YU Neng-Hai
Hong-Gang, HU
董高峰
Author_xml – sequence: 1
  givenname: DAI
  surname: Li
  fullname: Li, DAI
– sequence: 2
  givenname: DONG
  surname: Gao-Feng
  fullname: Gao-Feng, DONG
– sequence: 3
  givenname: HU
  surname: Hong-Gang
  fullname: Hong-Gang, HU
– sequence: 4
  fullname: YU Neng-Hai
– sequence: 5
  fullname: 戴立
– sequence: 6
  fullname: 董高峰
– sequence: 7
  fullname: 胡红钢
– sequence: 8
  fullname: 俞能海
BookMark eNotzbtKA0EUgOEpIiTGvICtjc2u58xtZ0qJRgMBQbQOs5MZyCq7cdc8gCDEWq1EvFRWai2B5GWyWfIWBrT6uv_fJLU0Sx0h2wghMiXVXhLa9GIYJjYPAYAh1EiDgo4CjijrpFUUwxiEkExRjg2yu7q_K79_qufX8uvltNM9WL5Nqs9Z9XS7mH0s5u-rm4fl47ScTLfIhjeXhWv92yTnncOz9nHQOznqtvd7wQipgoAqA9Igd5EFJ_3AaMO0cJpRQB9L74TgA2e41VbEsY1BWeAeI7E2stqxJtn5647y7Grsiut-ko3zdL3sU6U11YKhYL_s3FFB
ContentType Journal Article
Copyright 2019. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2019. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID JQ2
DOI 10.13868/j.cnki.jcr.000310
DatabaseName ProQuest Computer Science Collection
DatabaseTitle ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection
DeliveryMethod fulltext_linktorsrc
GroupedDBID -SI
-S~
ALMA_UNASSIGNED_HOLDINGS
CAJEI
JQ2
PB1
PB9
Q--
ID FETCH-LOGICAL-p1280-28a06a14e7c0e6fda9a395e93201fb6fe554dea4c9c5bbcb08c04f1758c07c9e3
ISSN 2097-4116
IngestDate Mon Jun 30 15:02:58 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 3
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p1280-28a06a14e7c0e6fda9a395e93201fb6fe554dea4c9c5bbcb08c04f1758c07c9e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2899295315
PQPubID 6503834
ParticipantIDs proquest_journals_2899295315
PublicationCentury 2000
PublicationDate 20190101
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – month: 01
  year: 2019
  text: 20190101
  day: 01
PublicationDecade 2010
PublicationPlace Beijing
PublicationPlace_xml – name: Beijing
PublicationTitle Journal of Cryptologic Research
PublicationYear 2019
Publisher Chinese Association for Cryptologic Research, Journal of Cryptologic Research
Publisher_xml – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research
SSID ssib055638241
ssib058688234
Score 2.1581872
Snippet 随着侧信道分析理论的不断发展, 其对缺乏保护的小型密码设备如RFID标签等的威胁也越来越严重. 为了保证数据的安全性, 不少种类的RFID标签可对通讯时的数据进行加密, 然而目前这类RFID标签在软硬件设计上仍然缺乏足够的抗侧信道攻击措施. 为研究在将侧信道分析理论应用于真实RFID标签攻击时的难度和实际攻击效果,...
SourceID proquest
SourceType Aggregation Database
StartPage 383
SubjectTerms Power consumption
Power management
Radio frequency
Radio frequency identification
Security
Tags
Weight reduction
Title 针对真实RFID标签的侧信道攻击
URI https://www.proquest.com/docview/2899295315
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6F9sIFgQDxKKgHVuLisrbXjz3ayboGlRRViZRb5F2vaUFKqpAe6A0JqZyBE0I8TpwoZ1Sp_JmmUf8Fs7bjpEp5XvyYtcdrz3j283hmB6E7ppfqYlbCyGylDJpQeOeUAwJxFEkZtSyltEP_YdON2_RBx-nUavszUUs7Q7Eid8_MK_kfqQIN5KqzZP9BshVTIMA2yBeWIGFY_pWMMWeYWdj3MXdwEOGQYe5hVscsyikcM74R3W9g7uKAYPjuh-aggUOeHxdgn2JO9W7g5RsRDkzN1Dcxs_VZDIih5gXnhuEvkGx98Hx7WBjRKpKvCvQpEtmDyjm7mvQNeIi5hWmsN6vSXnG_99hYLb3XcbuyRm2ww9ASJ1uzDgqdE3XKQaHrgCs9ycpU3fIIyrP6Vvw1-HP3c_toEeYZ1CxSNSfG3J3RWXvGMNtFuZy5AcP2XT8fMWTv6dbKEznQE1raZaTtqdm5m-vdqL221m3xTuscWrQ8T4cFLIa8-WhjYsH0bGu-NQWYDnD3rTy0oeptmbmlL3xv7rJziCCHOa2L6EL5WJaDQtkuodru5mV09-T1q9G37-P3H0f7H7RCHX_aG389HL97eXT45ejH55MXb47fHoz2Dq6gdsRb9dgoS2wY2wBMiGH5CXETkypPEuVmacISmzkKQD0xM-FmCtBmqhIqmXSEkIL4ktAMICesPcmUfRUt9Po9dQ0tA8EVxGVSUUGZyITnCOBH0zQljCh6HS1Nbq1bvkPPuvpz32IwDjg3ft98E52f6tYSWhgOdtQtgINDcbuUwU-x0l84
linkProvider ProQuest
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E9%92%88%E5%AF%B9%E7%9C%9F%E5%AE%9ERFID%E6%A0%87%E7%AD%BE%E7%9A%84%E4%BE%A7%E4%BF%A1%E9%81%93%E6%94%BB%E5%87%BB&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=Li%2C+DAI&rft.au=Gao-Feng%2C+DONG&rft.au=Hong-Gang%2C+HU&rft.au=YU+Neng-Hai&rft.date=2019-01-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=6&rft.issue=3&rft.spage=383&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000310&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon