Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks

Author:

Luo Yuling1,Zhang Shunsheng1,Liu Junxiu1ORCID,Cao Lvchen1

Affiliation:

1. School of Electronic Engineering, Guangxi Normal University, Guangxi Key Lab of Multi-Source Information Mining and Security, Guangxi Normal University, Guilin 541004, P. R. China

Abstract

The security of chaotic cryptographic system can be theoretically evaluated by using conventional statistical tests and numerical simulations, such as the character frequency test, entropy test, avalanche test and SP 800-22 tests. However, when the cryptographic algorithm operates on a cryptosystem, the leakage information such as power dissipation, electromagnetic emission and time-consuming can be used by attackers to analyze the secret keys, namely the Side Channel Analysis (SCA) attack. In this paper, a cryptanalysis method is proposed for evaluating the security of a chaotic block cryptographic system from a hardware perspective by utilizing the Template Attacks (TAs). Firstly, a chaotic block cryptographic system is described briefly and implemented based on an Atmel XMEGA microcontroller. Then the TA using a multivariate Gaussian model is introduced. In order to reduce computational complexity and improve the efficiency of TA, the Hamming weight is used in this work to model power consumption traces. The proposed TA method has the following advantages including (a) using the sum of difference to select points of interest of traces, (b) using a data processing method to minimize the influences on power information modeling from the redundant sampling points, and (c) all the traces are aligned precisely before establishing the templates. Experimental results show that the TA can be used to attack the chaotic cryptographic systems and is more efficient, i.e. [Formula: see text]32% less attack traces than correlation power analysis, when the templates are properly built.

Funder

National Natural Science Foundation of China

Natural Science Foundation of Guangxi Province

Publisher

World Scientific Pub Co Pte Lt

Subject

Applied Mathematics,Modelling and Simulation,Engineering (miscellaneous)

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Visual double image encryption scheme based on multilayer complex networks and wavelet transform;Nonlinear Dynamics;2024-06-04

2. Buffeting Chaotification Model for Enhancing Chaos and Its Hardware Implementation;IEEE Transactions on Industrial Electronics;2023-03

3. Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis;International Journal of Bifurcation and Chaos;2022-07

4. Lyapunov Exponent Enhancement in Chaotic Maps with Uniform Distribution Modulo One Transformation;Chaos Theory and Applications;2022-02-26

5. A Highly Efficient Profiled Power Analysis Attack Based on Power Leakage Fitting;2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2021-12

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3