针对真实RFID标签的侧信道攻击
随着侧信道分析理论的不断发展, 其对缺乏保护的小型密码设备如RFID标签等的威胁也越来越严重. 为了保证数据的安全性, 不少种类的RFID标签可对通讯时的数据进行加密, 然而目前这类RFID标签在软硬件设计上仍然缺乏足够的抗侧信道攻击措施. 为研究在将侧信道分析理论应用于真实RFID标签攻击时的难度和实际攻击效果, 本文选取了近年来新兴的一款具有广阔应用前景的可编程RFID标签(TB-WISP 5.0)进行侧信道攻击. 攻击从目标所运行的简单双向认证协议中的选择明文攻击漏洞入手, 以无触发信号、非侵入式的采集方式获取到了目标运行AES加密时的功耗和电磁泄露轨迹, 并分别利用这两种轨迹, 通过侧...
Saved in:
Published in | Journal of Cryptologic Research Vol. 6; no. 3; p. 383 |
---|---|
Main Authors | , , , , , , , |
Format | Journal Article |
Language | Chinese |
Published |
Beijing
Chinese Association for Cryptologic Research, Journal of Cryptologic Research
01.01.2019
|
Subjects | |
Online Access | Get full text |
ISSN | 2097-4116 |
DOI | 10.13868/j.cnki.jcr.000310 |
Cover
Abstract | 随着侧信道分析理论的不断发展, 其对缺乏保护的小型密码设备如RFID标签等的威胁也越来越严重. 为了保证数据的安全性, 不少种类的RFID标签可对通讯时的数据进行加密, 然而目前这类RFID标签在软硬件设计上仍然缺乏足够的抗侧信道攻击措施. 为研究在将侧信道分析理论应用于真实RFID标签攻击时的难度和实际攻击效果, 本文选取了近年来新兴的一款具有广阔应用前景的可编程RFID标签(TB-WISP 5.0)进行侧信道攻击. 攻击从目标所运行的简单双向认证协议中的选择明文攻击漏洞入手, 以无触发信号、非侵入式的采集方式获取到了目标运行AES加密时的功耗和电磁泄露轨迹, 并分别利用这两种轨迹, 通过侧信道分析理论成功恢复出了其完整的密钥信息. 这一实验结果充分说明了当下加强小型密码设备抗侧信道攻击设计的迫切性和必要性. 之后, 本文给出了在具有低功耗、轻量化、快速计算需求的可编程RFID标签设备上设计抗侧信道分析措施的一些建议. |
---|---|
AbstractList | 随着侧信道分析理论的不断发展, 其对缺乏保护的小型密码设备如RFID标签等的威胁也越来越严重. 为了保证数据的安全性, 不少种类的RFID标签可对通讯时的数据进行加密, 然而目前这类RFID标签在软硬件设计上仍然缺乏足够的抗侧信道攻击措施. 为研究在将侧信道分析理论应用于真实RFID标签攻击时的难度和实际攻击效果, 本文选取了近年来新兴的一款具有广阔应用前景的可编程RFID标签(TB-WISP 5.0)进行侧信道攻击. 攻击从目标所运行的简单双向认证协议中的选择明文攻击漏洞入手, 以无触发信号、非侵入式的采集方式获取到了目标运行AES加密时的功耗和电磁泄露轨迹, 并分别利用这两种轨迹, 通过侧信道分析理论成功恢复出了其完整的密钥信息. 这一实验结果充分说明了当下加强小型密码设备抗侧信道攻击设计的迫切性和必要性. 之后, 本文给出了在具有低功耗、轻量化、快速计算需求的可编程RFID标签设备上设计抗侧信道分析措施的一些建议. |
Author | 胡红钢 俞能海 Li, DAI Gao-Feng, DONG 戴立 YU Neng-Hai Hong-Gang, HU 董高峰 |
Author_xml | – sequence: 1 givenname: DAI surname: Li fullname: Li, DAI – sequence: 2 givenname: DONG surname: Gao-Feng fullname: Gao-Feng, DONG – sequence: 3 givenname: HU surname: Hong-Gang fullname: Hong-Gang, HU – sequence: 4 fullname: YU Neng-Hai – sequence: 5 fullname: 戴立 – sequence: 6 fullname: 董高峰 – sequence: 7 fullname: 胡红钢 – sequence: 8 fullname: 俞能海 |
BookMark | eNotzbtKA0EUgOEpIiTGvICtjc2u58xtZ0qJRgMBQbQOs5MZyCq7cdc8gCDEWq1EvFRWai2B5GWyWfIWBrT6uv_fJLU0Sx0h2wghMiXVXhLa9GIYJjYPAYAh1EiDgo4CjijrpFUUwxiEkExRjg2yu7q_K79_qufX8uvltNM9WL5Nqs9Z9XS7mH0s5u-rm4fl47ScTLfIhjeXhWv92yTnncOz9nHQOznqtvd7wQipgoAqA9Igd5EFJ_3AaMO0cJpRQB9L74TgA2e41VbEsY1BWeAeI7E2stqxJtn5647y7Grsiut-ko3zdL3sU6U11YKhYL_s3FFB |
ContentType | Journal Article |
Copyright | 2019. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2019. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | JQ2 |
DOI | 10.13868/j.cnki.jcr.000310 |
DatabaseName | ProQuest Computer Science Collection |
DatabaseTitle | ProQuest Computer Science Collection |
DatabaseTitleList | ProQuest Computer Science Collection |
DeliveryMethod | fulltext_linktorsrc |
GroupedDBID | -SI -S~ ALMA_UNASSIGNED_HOLDINGS CAJEI JQ2 PB1 PB9 Q-- |
ID | FETCH-LOGICAL-p1280-28a06a14e7c0e6fda9a395e93201fb6fe554dea4c9c5bbcb08c04f1758c07c9e3 |
ISSN | 2097-4116 |
IngestDate | Mon Jun 30 15:02:58 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 3 |
Language | Chinese |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p1280-28a06a14e7c0e6fda9a395e93201fb6fe554dea4c9c5bbcb08c04f1758c07c9e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2899295315 |
PQPubID | 6503834 |
ParticipantIDs | proquest_journals_2899295315 |
PublicationCentury | 2000 |
PublicationDate | 20190101 |
PublicationDateYYYYMMDD | 2019-01-01 |
PublicationDate_xml | – month: 01 year: 2019 text: 20190101 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Beijing |
PublicationPlace_xml | – name: Beijing |
PublicationTitle | Journal of Cryptologic Research |
PublicationYear | 2019 |
Publisher | Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
Publisher_xml | – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
SSID | ssib055638241 ssib058688234 |
Score | 2.1581872 |
Snippet | 随着侧信道分析理论的不断发展, 其对缺乏保护的小型密码设备如RFID标签等的威胁也越来越严重. 为了保证数据的安全性, 不少种类的RFID标签可对通讯时的数据进行加密, 然而目前这类RFID标签在软硬件设计上仍然缺乏足够的抗侧信道攻击措施. 为研究在将侧信道分析理论应用于真实RFID标签攻击时的难度和实际攻击效果,... |
SourceID | proquest |
SourceType | Aggregation Database |
StartPage | 383 |
SubjectTerms | Power consumption Power management Radio frequency Radio frequency identification Security Tags Weight reduction |
Title | 针对真实RFID标签的侧信道攻击 |
URI | https://www.proquest.com/docview/2899295315 |
Volume | 6 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6F9sIFgQDxKKgHVuLisrbXjz3ayboGlRRViZRb5F2vaUFKqpAe6A0JqZyBE0I8TpwoZ1Sp_JmmUf8Fs7bjpEp5XvyYtcdrz3j283hmB6E7ppfqYlbCyGylDJpQeOeUAwJxFEkZtSyltEP_YdON2_RBx-nUavszUUs7Q7Eid8_MK_kfqQIN5KqzZP9BshVTIMA2yBeWIGFY_pWMMWeYWdj3MXdwEOGQYe5hVscsyikcM74R3W9g7uKAYPjuh-aggUOeHxdgn2JO9W7g5RsRDkzN1Dcxs_VZDIih5gXnhuEvkGx98Hx7WBjRKpKvCvQpEtmDyjm7mvQNeIi5hWmsN6vSXnG_99hYLb3XcbuyRm2ww9ASJ1uzDgqdE3XKQaHrgCs9ycpU3fIIyrP6Vvw1-HP3c_toEeYZ1CxSNSfG3J3RWXvGMNtFuZy5AcP2XT8fMWTv6dbKEznQE1raZaTtqdm5m-vdqL221m3xTuscWrQ8T4cFLIa8-WhjYsH0bGu-NQWYDnD3rTy0oeptmbmlL3xv7rJziCCHOa2L6EL5WJaDQtkuodru5mV09-T1q9G37-P3H0f7H7RCHX_aG389HL97eXT45ejH55MXb47fHoz2Dq6gdsRb9dgoS2wY2wBMiGH5CXETkypPEuVmacISmzkKQD0xM-FmCtBmqhIqmXSEkIL4ktAMICesPcmUfRUt9Po9dQ0tA8EVxGVSUUGZyITnCOBH0zQljCh6HS1Nbq1bvkPPuvpz32IwDjg3ft98E52f6tYSWhgOdtQtgINDcbuUwU-x0l84 |
linkProvider | ProQuest |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E9%92%88%E5%AF%B9%E7%9C%9F%E5%AE%9ERFID%E6%A0%87%E7%AD%BE%E7%9A%84%E4%BE%A7%E4%BF%A1%E9%81%93%E6%94%BB%E5%87%BB&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=Li%2C+DAI&rft.au=Gao-Feng%2C+DONG&rft.au=Hong-Gang%2C+HU&rft.au=YU+Neng-Hai&rft.date=2019-01-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=6&rft.issue=3&rft.spage=383&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000310&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon |