一种NoisyRounds 保护的白盒AES 实现及其差分故障分析
差分故障分析 (differential fault analysis, DFA) 是一种通过对密码算法中间状态注入错误从而获取密钥信息的侧信道攻击方法. 由Bos等人创造性的用于白盒分组密码方案并成功破解多个公开发表的白盒AES实现 . 本文基于随机冗余轮函数 (DummyRounds) 和 Chow 等人的AES 白盒实现 (以下简称Chow-WBAES), 提出一种称为 NoisyRounds 的白盒AES安全加固方案 (以下简称NoisyRounds-WBAES). 该方案通过改变Chow-WBAES的第 10 轮并在其后添加相互抵消的结构, 使得NoisyRounds-WBAES能对...
Saved in:
Published in | Journal of Cryptologic Research Vol. 7; no. 3; p. 342 |
---|---|
Main Authors | , , , , , , , , , |
Format | Journal Article |
Language | Chinese |
Published |
Beijing
Chinese Association for Cryptologic Research, Journal of Cryptologic Research
29.06.2020
|
Subjects | |
Online Access | Get full text |
ISSN | 2097-4116 |
DOI | 10.13868/j.cnki.jcr.000372 |
Cover
Abstract | 差分故障分析 (differential fault analysis, DFA) 是一种通过对密码算法中间状态注入错误从而获取密钥信息的侧信道攻击方法. 由Bos等人创造性的用于白盒分组密码方案并成功破解多个公开发表的白盒AES实现 . 本文基于随机冗余轮函数 (DummyRounds) 和 Chow 等人的AES 白盒实现 (以下简称Chow-WBAES), 提出一种称为 NoisyRounds 的白盒AES安全加固方案 (以下简称NoisyRounds-WBAES). 该方案通过改变Chow-WBAES的第 10 轮并在其后添加相互抵消的结构, 使得NoisyRounds-WBAES能对DFA分析产生混淆作用. 通过NoisyRounds-WBAES与Chow-WBAES实施DFA攻击的分析结果表明, 在带外部编码的情况下, NoisyRounds 与现有保护方案一样能抵抗 DFA 工具的分析. 但相应的算法的输出结果也将带上外部编码, 从而失去不同系统间的兼容性, 在不带外部编码的情况下, n组 NoisyRounds 对 DFA 分析将产生 O(n4) 的计算复杂度. |
---|---|
AbstractList | 差分故障分析 (differential fault analysis, DFA) 是一种通过对密码算法中间状态注入错误从而获取密钥信息的侧信道攻击方法. 由Bos等人创造性的用于白盒分组密码方案并成功破解多个公开发表的白盒AES实现 . 本文基于随机冗余轮函数 (DummyRounds) 和 Chow 等人的AES 白盒实现 (以下简称Chow-WBAES), 提出一种称为 NoisyRounds 的白盒AES安全加固方案 (以下简称NoisyRounds-WBAES). 该方案通过改变Chow-WBAES的第 10 轮并在其后添加相互抵消的结构, 使得NoisyRounds-WBAES能对DFA分析产生混淆作用. 通过NoisyRounds-WBAES与Chow-WBAES实施DFA攻击的分析结果表明, 在带外部编码的情况下, NoisyRounds 与现有保护方案一样能抵抗 DFA 工具的分析. 但相应的算法的输出结果也将带上外部编码, 从而失去不同系统间的兼容性, 在不带外部编码的情况下, n组 NoisyRounds 对 DFA 分析将产生 O(n4) 的计算复杂度. |
Author | Zhen-Ning, MAO 龚征 唐国俊 Guo-Jun, TANG 孙涛 Xin-Kai, WU 吴昕锴 SUN, Tao GONG, Zheng 毛振宁 |
Author_xml | – sequence: 1 givenname: Tao surname: SUN fullname: SUN, Tao – sequence: 2 givenname: TANG surname: Guo-Jun fullname: Guo-Jun, TANG – sequence: 3 givenname: WU surname: Xin-Kai fullname: Xin-Kai, WU – sequence: 4 givenname: MAO surname: Zhen-Ning fullname: Zhen-Ning, MAO – sequence: 5 givenname: Zheng surname: GONG fullname: GONG, Zheng – sequence: 6 fullname: 孙涛 – sequence: 7 fullname: 唐国俊 – sequence: 8 fullname: 吴昕锴 – sequence: 9 fullname: 毛振宁 – sequence: 10 fullname: 龚征 |
BookMark | eNotjTtLw1AYQO9QwVr7B5wKzonffd87llAfUBR8zCWPG0iUpCZmcHOwIgUfCA5W7SS4FSd1Ef9M0-C_UNHpnOmcBVRL0sQgtITBxlQJtRLbfrIf2bGf2QBAJamhOgEtLYaxmEfNPI884FxQRRiuI2f6flI9X2ymUX68nRZJkLemn4-z4VM1Oq3uPqr7m3Znp1VOxtXlS3k1LAev5dukPD-b3Q6-Rg-_Mr5eRHOhe5Cb5j8baG-1s-usW92ttQ2n3bX6mChuKU1CQUxIwXUV5SEAA5AuM6BZ4BGPEiZB-JhqYrjPjcDE9WQAhqpQub6hDbT81-1n6WFh8qNenBZZ8rPsEaU1EYozSb8BRLleug |
ContentType | Journal Article |
Copyright | 2020. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2020. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | JQ2 |
DOI | 10.13868/j.cnki.jcr.000372 |
DatabaseName | ProQuest Computer Science Collection |
DatabaseTitle | ProQuest Computer Science Collection |
DatabaseTitleList | ProQuest Computer Science Collection |
DeliveryMethod | fulltext_linktorsrc |
GroupedDBID | -SI -S~ ALMA_UNASSIGNED_HOLDINGS CAJEI JQ2 PB1 PB9 Q-- |
ID | FETCH-LOGICAL-p1285-892f62ef30aa835f004007a4e094db2b324706c1392e5c5e612ab7d0e38f8ace3 |
ISSN | 2097-4116 |
IngestDate | Mon Jun 30 15:08:26 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 3 |
Language | Chinese |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p1285-892f62ef30aa835f004007a4e094db2b324706c1392e5c5e612ab7d0e38f8ace3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2899268547 |
PQPubID | 6503834 |
ParticipantIDs | proquest_journals_2899268547 |
PublicationCentury | 2000 |
PublicationDate | 2020-06-29 |
PublicationDateYYYYMMDD | 2020-06-29 |
PublicationDate_xml | – month: 06 year: 2020 text: 2020-06-29 day: 29 |
PublicationDecade | 2020 |
PublicationPlace | Beijing |
PublicationPlace_xml | – name: Beijing |
PublicationTitle | Journal of Cryptologic Research |
PublicationYear | 2020 |
Publisher | Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
Publisher_xml | – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
SSID | ssib055638241 ssib058688234 |
Score | 2.2027872 |
Snippet | 差分故障分析 (differential fault analysis, DFA) 是一种通过对密码算法中间状态注入错误从而获取密钥信息的侧信道攻击方法. 由Bos等人创造性的用于白盒分组密码方案并成功破解多个公开发表的白盒AES实现 . 本文基于随机冗余轮函数 (DummyRounds) 和 Chow 等人的AES... |
SourceID | proquest |
SourceType | Aggregation Database |
StartPage | 342 |
SubjectTerms | Algorithms Coding Cryptography Incompatibility Software |
Title | 一种NoisyRounds 保护的白盒AES 实现及其差分故障分析 |
URI | https://www.proquest.com/docview/2899268547 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6F9sIFgQDxKCgH9oQcnPVjd492slFVWhdVicgtcpy1SJGSKo9De-JAEarEQ0gcKNATEreKE3BB_JmmEfwKZteJHZTyvFijXXvW9oxnvl3PziB0I4RvJoolNWA6wWCCUiwaAEMioGJpFVtmbOmU-WuBu1yzV-pOPZf7PhO1NBw0C9HOiftK_keq0AZyVbtk_0GyKVNoABrkC0eQMBz_SsZY2NhnKlhBUOxRzMpBt93f3lClkvo3dW8F8zIWLmYe9mx1GvcwSwiO_bImfMyJJ2BCLxzsCcyFamUC-6ZqYRV1sSIc7LuK8Kk6TbXA2K7iznWv4Io7L_3cBQzNX0DgUm97a5BY3zQEMF3yqekAhGrYTUOEhl1jZZhUU_aCtCZYvd0xbidFte_WsnVw2TGCSb2WNW99dnGDqBo4BslMqKohLlWClkxVdfTlSbeX_HH48xNo20pMTg27mGzznDoCOqPv1oxRt5L8X3POxmIu094m6txvFzajXkGn8yGZa52GEwTrjUptdbVRFfXqKbRIKFUhBYu-CO5sTK2fytTGSAZOHeDOiA6LSO92sutLDXxrbtg5NKEhUvUsOjN5LXkvUdRzKLdz7zwqHX1-MH7_ZEYx80df3x7vvRvvPxy_-jJ-_QJULz86PBg__TB6tjfa_Tj6dDh6_Oj45e63_TeKOHh-AdUqolpaNiaVO4wtwDuOwTiJXSJjywxDgPixdhU0tKXJ7VaTNAHFU9ONYPZBpBM5EmB22KQtU1osZmEkrYtoodPtyEsoL7lDJaDmFnTbNAoZ-GNCzdiNwI5wEl5GS9Onbkw-zX5DrSIQlzk2vfL77qvodKZ2S2hh0BvKa4AyB83rE_H8ANFHe1w |
linkProvider | ProQuest |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E4%B8%80%E7%A7%8DNoisyRounds+%E4%BF%9D%E6%8A%A4%E7%9A%84%E7%99%BD%E7%9B%92AES+%E5%AE%9E%E7%8E%B0%E5%8F%8A%E5%85%B6%E5%B7%AE%E5%88%86%E6%95%85%E9%9A%9C%E5%88%86%E6%9E%90&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=SUN%2C+Tao&rft.au=Guo-Jun%2C+TANG&rft.au=Xin-Kai%2C+WU&rft.au=Zhen-Ning%2C+MAO&rft.date=2020-06-29&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=7&rft.issue=3&rft.spage=342&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000372&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon |