Unlock instant, AI-driven research and patent intelligence for your innovation.

Power consumption attack efficient screening method based on genetic algorithm

A technology of power consumption attack and genetic algorithm, which is applied in the field of high-efficiency screening of power consumption attack based on genetic algorithm, to achieve the effect of low complexity

Active Publication Date: 2021-07-16
HENGYANG NORMAL UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But so far, there are still deficiencies in these methods that combine genetic algorithms and power consumption attacks, as well as in the subsequent improved methods, so this project will conduct research on these deficiencies and overcome these deficiencies. achieve better results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power consumption attack efficient screening method based on genetic algorithm
  • Power consumption attack efficient screening method based on genetic algorithm
  • Power consumption attack efficient screening method based on genetic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] An efficient screening method for power consumption attacks based on genetic algorithms provided in this embodiment, such as figure 1 shown, including the following steps:

[0049] A1: Collect power consumption leakage information from cryptographic devices to form raw data.

[0050] Randomly generate 64 1-bit binary random numbers as a plaintext, generate a total of 500 random plaintexts and number them, and let the specified key and plaintext run the encryption algorithm to obtain the ciphertext, and collect the required power consumption information; the collected information Including two kinds of power consumption, one is to make overall statistics on the output of the S box, and use the power consumption described by the Hamming weight model as a power consumption sample to judge whether the correct key has been recovered; the other One is to make separate statistics on the output of each S-box, and also use the Hamming weight model to describe the power consumpt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power consumption attack efficient screening method based on a genetic algorithm. The method comprises: collecting power consumption; determining parameters and a fitness function; initializing a population; calculating individual fitness; calculating byte fitness; selecting an excellent individual stage; a crossing stage; and a variation stage. According to the method, the power consumption attack technology in the side channel analysis technology is combined, and the traditional power consumption attack is combined with the improved genetic algorithm, so that the calculation complexity of the traditional power consumption attack is reduced, and the attack efficiency and success rate are improved; and meanwhile, the problems of individual degradation and low evolution speed in a traditional genetic algorithm and power consumption attack combined method are solved.

Description

technical field [0001] The invention belongs to the field of side channel analysis, and in particular relates to a genetic algorithm-based efficient screening method for power consumption attacks, which can improve attack efficiency and reduce resource complexity such as calculation. Background technique [0002] In side-channel attacks, side-channel attacks based on power consumption are the most common attack methods. As the name implies, power consumption attacks are based on power consumption information generated by cryptographic chips, cryptographic devices, or cryptographic modules during cryptographic algorithms. A side-channel attack method of the attack. Similarly, power consumption attacks can also be divided into many different analysis methods: in 2002, the simple power attack (Simple Power Attack, SPA) proposed by Joong et al., the differential power attack (Differential Power Attack, SPA) proposed by Kocher et al. Attack, DPA), Correlation Power Attack (CPA) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F30/27G06N3/00G06N3/12G06F111/08G06F119/06
CPCG06F30/27G06N3/006G06N3/126G06F2111/08G06F2119/06Y02D30/70
Inventor 李浪刘嘉辉
Owner HENGYANG NORMAL UNIV