DOI QR코드

DOI QR Code

신호 압신법을 이용한 차분전력분석 공격성능 향상

Performance Enhancement of Differential Power Analysis Attack with Signal Companding Methods

  • 류정춘 (고려대학교 정보경영공학전문대학원) ;
  • 한동국 (한국전자통신연구원 정보보호연구단) ;
  • 김성경 (고려대학교 정보경영공학전문대학원) ;
  • 김희석 (고려대학교 정보경영공학전문대학원) ;
  • 김태현 (고려대학교 정보경영공학전문대학원) ;
  • 이상진 (고려대학교 정보경영공학전문대학원)
  • Ryoo, Jeong-Choon (Graduate School of Information Management and Security, Korea University) ;
  • Han, Dong-Guk (Electronics and Telecommunications Research Institute) ;
  • Kim, Sung-Kyoung (Graduate School of Information Management and Security, Korea University) ;
  • Kim, Hee-Seok (Graduate School of Information Management and Security, Korea University) ;
  • Kim, Tae-Hyun (Graduate School of Information Management and Security, Korea University) ;
  • Lee, Sang-Jin (Graduate School of Information Management and Security, Korea University)
  • 발행 : 2008.04.30

초록

지금까지 제안된 많은 부채널 공격법(Side Channel Attack, SCA) 중 수집신호의 통계적 특성을 기반으로 하는 차분전력분석(Differential Power Analysis, DPA) 방법은 키를 해독하는 데 아주 효과적인 방법으로 알려져 있다. 그러나, 이 방법은 수집신호의 시간적인 동기 및 잡음에 따라 공격 성능에 상당한 영향을 받는다. 따라서 본 논문에서는 DPA에서 잡음에 의한 영향을 효과적으로 극복하는 새로운 방법을 제안하다. 제안된 방법의 성능은 DES 연산중인 마이크로 컨트롤러 칩의 전력소비 신호를 이용해서 기존 방식의 DPA와 시간 및 주파수 영역에서 비교한다. 실험을 통해 제안된 전처리 시스템의 성능 평가는 키 해독에 필요한 필요 평문의 수를 기준으로 계산할 경우, 기존의 방식과 비교하여 시간 영역에서 33%, 주파수 영역에서 50%의 성능이 개선되는 등 아주 우수한 결과를 보여주고 있다.

Among previous Side Channel Analysis (SCA) methods, Differential Power Analysis (DPA) based on the statistical characteristics of collected signals has been known as an efficient attack for uncovering secret key of cryptosystems. However, the attack performance of this method is affected very much by the temporal misalignment and noise of collected side channel signals. In this paper, we propose a new method to surmount the noise problem in DPA. The performance of the proposed method is then evaluated while analyzing the power consumption signals of Micro-controller chips during a DES operation. Its performance is then compared to that of the original DPA in the time and frequency domains. When we compare the experimental results with respect to the needed number of traces to uncover the secret key, our proposed method shows the performance enhancement 33% in the time domain and 50% in the frequency domain.

키워드

참고문헌

  1. P.Kocher, J.Jaffe, and B. Jun, "Introduction to differential power analysis and related attacks," 1998, White Paper, Cryptography Research
  2. P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO 1999, LNCS 1666, pp. 388-397, Springer-Verlag, 1999
  3. E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," CHES 2004. LNCS 3156, pp. 16-29, Springer-Verlag, 2004
  4. K. Gandolfi, C. Mourtel, and F. Olivier, "Electromagnetic Analysis: Concrete Results," CHES 2001, LNCS 2162, pp. 251-261, SpringerVerlag, 200l
  5. J.J Quisquater and D. Samyde, "Electromagnetic Analysis(EMA): Measures and Countermeasures for Smart Cards," in In proceedings of e-Smart 2001
  6. C. Gebotys, S. Ho, and A. Tiu, "EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA," CHES 2005, LNCS 3659, pp. 250-264, Springer-Verlag, 2005
  7. T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," Journal of IEEE Trans. on Computers, vol.51, Issue 5, pp.541-552, 2002 https://doi.org/10.1109/TC.2002.1004593
  8. R. Bevan and E. Knudsen, "Ways to Enhance DPA," ICISC 2002. LNCS 2587, pp. 327-342, Springer-Verlag, 2003
  9. T-H. Le, J. Clediere, C. Serviere, and J-L. Lacoume, "Efficient solution for misalignment of signal in side channel analysis," ICASSP 2007, pp.257-260
  10. K. Tiri, I.Verbauwhede, "Simulation Models for side-channel information leaks," Annual ACM IEEE Design Automation Conference 2005, pp. 228 - 233, 2005
  11. FIPS PUB 46-3, "Data Encryption Standard (DES)," National Institute of Standards and Technology, 1999
  12. Microchip Technology Inc., PIC16F8X-18 pin Flash EEPROM 8-bit Microcontrollers, 1998
  13. N.S. Jayant, Peter Noll Digital Coding of Waveforms : Principles and Applications to Speech and Video, Prentice Hall, 1984
  14. Richard G. Lyons Understanding Digital Signal Processing Second Edition, Prentice Hall, 2004