DPA attack method for carrying out fitting by utilizing neural network, system and terminal

A neural network and prediction neural network technology, applied in the DPA attack method and system, terminal field, can solve the problems of insufficiency, limited application scenarios of high-order template attack, etc., to achieve the effect of improving attack efficiency

Inactive Publication Date: 2019-03-26
CHENGDU UNIV OF INFORMATION TECH
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The attacker must have full control of the training device (be able to modify the encryption code in the training device) to learn the random mask, which is generally difficult to meet
Therefore, the applicable scenarios of high-order template attacks are very limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DPA attack method for carrying out fitting by utilizing neural network, system and terminal
  • DPA attack method for carrying out fitting by utilizing neural network, system and terminal
  • DPA attack method for carrying out fitting by utilizing neural network, system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0071] The invention adopts the neural network to establish the fitting model of the energy consumption and the unmasked intermediate combination value, and attacks based on the correlation coefficient between the fitted unmasked intermediate combination value and the guessed unmasked intermediate combination value.

[0072] This approach eliminates the requirement of having to know the mask during the learning phase, avoids the need for high-order DPA to cross-combine energy, reduces the attack conditions, and improves the attack efficiency. Experiments confirm the feasibility and efficiency of the attack algorithm.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of cipher algorithm analysis and detection and discloses a DPA attack method for carrying out fitting by utilizing a neural network, a system and a terminal. In thetraining stage, a predictive neural network automatically learns and obtains a mapping relationship between an energy consumption characteristic vector and an intermediate combination value accordingto a training energy consumption set; and in high-order DPA attack, the predictive neural network is used to predict the intermediate combination value of the attack energy trace, and the correlationcoefficient between a predictive intermediate combination value and a conjecture intermediate combination is calculated, thus the device key is attacked. The method of the invention eliminates the requirement that the mask must be understood in the learning stage, simultaneously avoids the requirement of the high-order DPA on the energy consumption cross-combination, reduces the attack condition,and improves the attack efficiency. Experimental results show that the attack algorithm is feasible and efficient.

Description

technical field [0001] The invention belongs to the field of cryptographic algorithm analysis and detection technology, and in particular relates to a DPA attack method, a system and a terminal for fitting by using a neural network. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] In the side channel attack, the method of using the energy consumption change in the cryptographic device to attack the private information such as the key is called an energy analysis attack. Essentially, this attack exploits two types of energy consumption dependencies: data dependencies and operational dependencies. Based on this theory, Kocher et al. first proposed the concept and method of DPA attack in 1999, which made the security of cryptographic devices such as smart card chips suffer great challenges. The attack is based on the principle that the energy consumption of a cryptographic device depends on the intermed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00G06N3/08
CPCH04L9/003G06N3/084
Inventor 王燚
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products