Power consumption attack efficient screening method based on genetic algorithm
A technology of power consumption attack and genetic algorithm, which is applied in the field of high-efficiency screening of power consumption attack based on genetic algorithm, to achieve the effect of low complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] An efficient screening method for power consumption attacks based on genetic algorithms provided in this embodiment, such as figure 1 shown, including the following steps:
[0049] A1: Collect power consumption leakage information from cryptographic devices to form raw data.
[0050] Randomly generate 64 1-bit binary random numbers as a plaintext, generate a total of 500 random plaintexts and number them, and let the specified key and plaintext run the encryption algorithm to obtain the ciphertext, and collect the required power consumption information; the collected information Including two kinds of power consumption, one is to make overall statistics on the output of the S box, and use the power consumption described by the Hamming weight model as a power consumption sample to judge whether the correct key has been recovered; the other One is to make separate statistics on the output of each S-box, and also use the Hamming weight model to describe the power consumpt...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


