Affiliation:
1. School of Electronic Engineering, Guangxi Normal University, Guangxi Key Lab of Multi-Source Information Mining and Security, Guangxi Normal University, Guilin 541004, P. R. China
Abstract
The security of chaotic cryptographic system can be theoretically evaluated by using conventional statistical tests and numerical simulations, such as the character frequency test, entropy test, avalanche test and SP 800-22 tests. However, when the cryptographic algorithm operates on a cryptosystem, the leakage information such as power dissipation, electromagnetic emission and time-consuming can be used by attackers to analyze the secret keys, namely the Side Channel Analysis (SCA) attack. In this paper, a cryptanalysis method is proposed for evaluating the security of a chaotic block cryptographic system from a hardware perspective by utilizing the Template Attacks (TAs). Firstly, a chaotic block cryptographic system is described briefly and implemented based on an Atmel XMEGA microcontroller. Then the TA using a multivariate Gaussian model is introduced. In order to reduce computational complexity and improve the efficiency of TA, the Hamming weight is used in this work to model power consumption traces. The proposed TA method has the following advantages including (a) using the sum of difference to select points of interest of traces, (b) using a data processing method to minimize the influences on power information modeling from the redundant sampling points, and (c) all the traces are aligned precisely before establishing the templates. Experimental results show that the TA can be used to attack the chaotic cryptographic systems and is more efficient, i.e. [Formula: see text]32% less attack traces than correlation power analysis, when the templates are properly built.
Funder
National Natural Science Foundation of China
Natural Science Foundation of Guangxi Province
Publisher
World Scientific Pub Co Pte Lt
Subject
Applied Mathematics,Modelling and Simulation,Engineering (miscellaneous)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Visual double image encryption scheme based on multilayer complex networks and wavelet transform;Nonlinear Dynamics;2024-06-04
2. Buffeting Chaotification Model for Enhancing Chaos and Its Hardware Implementation;IEEE Transactions on Industrial Electronics;2023-03
3. Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis;International Journal of Bifurcation and Chaos;2022-07
4. Lyapunov Exponent Enhancement in Chaotic Maps with Uniform Distribution Modulo One Transformation;Chaos Theory and Applications;2022-02-26
5. A Highly Efficient Profiled Power Analysis Attack Based on Power Leakage Fitting;2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2021-12