Evolutionary ciphers against differential power analysis and differential fault analysis
Side channel analysis(SCA) focuses on attacking cryptographic algorithm implementations by col- lecting leaked information and analyzing the correlation between the leaked and key information in the crypto- graphic system. Currently, SCA is the main threat to cryptographic implementations, with DPA...
Gespeichert in:
Veröffentlicht in: | Science China. Information sciences 2012-11, Vol.55 (11), p.2555-2569 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2569 |
---|---|
container_issue | 11 |
container_start_page | 2555 |
container_title | Science China. Information sciences |
container_volume | 55 |
creator | Tang, Ming Qiu, ZhenLong Yang, Min Cheng, PingPan Gao, Si Liu, ShuBo Meng, QinShu |
description | Side channel analysis(SCA) focuses on attacking cryptographic algorithm implementations by col- lecting leaked information and analyzing the correlation between the leaked and key information in the crypto- graphic system. Currently, SCA is the main threat to cryptographic implementations, with DPA (differential power analysis) and DFA (differential fault analysis) being two of the most threatening types of SCA. However, the existing countermeasures against DPA and DFA have shortcomings and can hardly protect cipher designs perfectly. Based on a comprehensive analysis of DPA and DFA, this paper proposes a new idea of using an evo- lutionary cipher (EVOC) against DPAs based on the model proposed by Kocher, and several different new types of DFAs. In fact, an EVOC is a kind of dynamic cipher designing method. Moreover, combined with intelligent searching algorithms and cryptography design policies, EVOCs utilize the dynamic and unpredictable properties of TRNG (a truly random number generator) to ensure cipher design at a high level of security. Therefore, with an EVOC we could design cryptography algorithms with high security to resist mathematical analysis as well as DPAs and DFAs. This paper analyzes and proves the security, efficiency, cost, and original features of EVOCs against DPA and DFA both theoretically and experimentally. Compared with existing countermeasures against SCAs, EVOCs use dynamic non-linear operations to destroy the bases of DPA and DFA. At the algorithm level, EVOCs are more efficient than other resistance methods. Based on the theory and experiments, this paper proposes certain modifications to the EVOC in the AES (advanced encryption standard) algorithm, which can be referenced by other dynamic designs of cryptographic algorithms. |
doi_str_mv | 10.1007/s11432-012-4615-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918611697</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>43502071</cqvip_id><sourcerecordid>2918611697</sourcerecordid><originalsourceid>FETCH-LOGICAL-c342t-3a67ac24e215db235ff760680e28f5bd81a1bcf420e15dd5731246d53eb87a0f3</originalsourceid><addsrcrecordid>eNp9kEFLwzAUx4MoOOY-gLeK52hekibtUcZ0wsCLwm4hbZOtozZd0ir79mZ0TLyYSwLv93_v5YfQLZAHIEQ-BgDOKCZAMReQYnGBJpCJHEMO-WV8C8mxZGx9jWYh7Eg8jBEqswlaL75cM_S1a7U_JGXdbY0Pid7oug19UtXWGm_avtZN0rlv4xPd6uYQ6si01d-61UPTn-s36MrqJpjZ6Z6ij-fF-3yJV28vr_OnFS4Zpz1mWkhdUm4opFVBWWqtFERkxNDMpkWVgYaitJwSE4EqlQwoF1XKTJFJTSybovuxb-fdfjChVzs3-LhEUDSPEgBELiMFI1V6F4I3VnW-_oxfVkDU0aEaHaroUB0dKhEzdMyEyLYb4387_xe6Ow3aunazj7nzJM5SQokE9gPoA4A2</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918611697</pqid></control><display><type>article</type><title>Evolutionary ciphers against differential power analysis and differential fault analysis</title><source>SpringerNature Journals</source><source>ProQuest Central UK/Ireland</source><source>Alma/SFX Local Collection</source><source>ProQuest Central</source><creator>Tang, Ming ; Qiu, ZhenLong ; Yang, Min ; Cheng, PingPan ; Gao, Si ; Liu, ShuBo ; Meng, QinShu</creator><creatorcontrib>Tang, Ming ; Qiu, ZhenLong ; Yang, Min ; Cheng, PingPan ; Gao, Si ; Liu, ShuBo ; Meng, QinShu</creatorcontrib><description>Side channel analysis(SCA) focuses on attacking cryptographic algorithm implementations by col- lecting leaked information and analyzing the correlation between the leaked and key information in the crypto- graphic system. Currently, SCA is the main threat to cryptographic implementations, with DPA (differential power analysis) and DFA (differential fault analysis) being two of the most threatening types of SCA. However, the existing countermeasures against DPA and DFA have shortcomings and can hardly protect cipher designs perfectly. Based on a comprehensive analysis of DPA and DFA, this paper proposes a new idea of using an evo- lutionary cipher (EVOC) against DPAs based on the model proposed by Kocher, and several different new types of DFAs. In fact, an EVOC is a kind of dynamic cipher designing method. Moreover, combined with intelligent searching algorithms and cryptography design policies, EVOCs utilize the dynamic and unpredictable properties of TRNG (a truly random number generator) to ensure cipher design at a high level of security. Therefore, with an EVOC we could design cryptography algorithms with high security to resist mathematical analysis as well as DPAs and DFAs. This paper analyzes and proves the security, efficiency, cost, and original features of EVOCs against DPA and DFA both theoretically and experimentally. Compared with existing countermeasures against SCAs, EVOCs use dynamic non-linear operations to destroy the bases of DPA and DFA. At the algorithm level, EVOCs are more efficient than other resistance methods. Based on the theory and experiments, this paper proposes certain modifications to the EVOC in the AES (advanced encryption standard) algorithm, which can be referenced by other dynamic designs of cryptographic algorithms.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-012-4615-6</identifier><language>eng</language><publisher>Heidelberg: SP Science China Press</publisher><subject>Algorithms ; Computer Science ; Cost analysis ; Cryptography ; Design ; Encryption ; Information Systems and Communication Service ; Mathematical analysis ; Random numbers ; Research Paper ; Search algorithms ; Security ; 加密算法 ; 实验基础 ; 差分功耗分析 ; 故障分析 ; 智能搜索算法 ; 演化密码 ; 真随机数发生器 ; 设计方法</subject><ispartof>Science China. Information sciences, 2012-11, Vol.55 (11), p.2555-2569</ispartof><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2012</rights><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2012.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c342t-3a67ac24e215db235ff760680e28f5bd81a1bcf420e15dd5731246d53eb87a0f3</citedby><cites>FETCH-LOGICAL-c342t-3a67ac24e215db235ff760680e28f5bd81a1bcf420e15dd5731246d53eb87a0f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009A/84009A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-012-4615-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918611697?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Tang, Ming</creatorcontrib><creatorcontrib>Qiu, ZhenLong</creatorcontrib><creatorcontrib>Yang, Min</creatorcontrib><creatorcontrib>Cheng, PingPan</creatorcontrib><creatorcontrib>Gao, Si</creatorcontrib><creatorcontrib>Liu, ShuBo</creatorcontrib><creatorcontrib>Meng, QinShu</creatorcontrib><title>Evolutionary ciphers against differential power analysis and differential fault analysis</title><title>Science China. Information sciences</title><addtitle>Sci. China Inf. Sci</addtitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><description>Side channel analysis(SCA) focuses on attacking cryptographic algorithm implementations by col- lecting leaked information and analyzing the correlation between the leaked and key information in the crypto- graphic system. Currently, SCA is the main threat to cryptographic implementations, with DPA (differential power analysis) and DFA (differential fault analysis) being two of the most threatening types of SCA. However, the existing countermeasures against DPA and DFA have shortcomings and can hardly protect cipher designs perfectly. Based on a comprehensive analysis of DPA and DFA, this paper proposes a new idea of using an evo- lutionary cipher (EVOC) against DPAs based on the model proposed by Kocher, and several different new types of DFAs. In fact, an EVOC is a kind of dynamic cipher designing method. Moreover, combined with intelligent searching algorithms and cryptography design policies, EVOCs utilize the dynamic and unpredictable properties of TRNG (a truly random number generator) to ensure cipher design at a high level of security. Therefore, with an EVOC we could design cryptography algorithms with high security to resist mathematical analysis as well as DPAs and DFAs. This paper analyzes and proves the security, efficiency, cost, and original features of EVOCs against DPA and DFA both theoretically and experimentally. Compared with existing countermeasures against SCAs, EVOCs use dynamic non-linear operations to destroy the bases of DPA and DFA. At the algorithm level, EVOCs are more efficient than other resistance methods. Based on the theory and experiments, this paper proposes certain modifications to the EVOC in the AES (advanced encryption standard) algorithm, which can be referenced by other dynamic designs of cryptographic algorithms.</description><subject>Algorithms</subject><subject>Computer Science</subject><subject>Cost analysis</subject><subject>Cryptography</subject><subject>Design</subject><subject>Encryption</subject><subject>Information Systems and Communication Service</subject><subject>Mathematical analysis</subject><subject>Random numbers</subject><subject>Research Paper</subject><subject>Search algorithms</subject><subject>Security</subject><subject>加密算法</subject><subject>实验基础</subject><subject>差分功耗分析</subject><subject>故障分析</subject><subject>智能搜索算法</subject><subject>演化密码</subject><subject>真随机数发生器</subject><subject>设计方法</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kEFLwzAUx4MoOOY-gLeK52hekibtUcZ0wsCLwm4hbZOtozZd0ir79mZ0TLyYSwLv93_v5YfQLZAHIEQ-BgDOKCZAMReQYnGBJpCJHEMO-WV8C8mxZGx9jWYh7Eg8jBEqswlaL75cM_S1a7U_JGXdbY0Pid7oug19UtXWGm_avtZN0rlv4xPd6uYQ6si01d-61UPTn-s36MrqJpjZ6Z6ij-fF-3yJV28vr_OnFS4Zpz1mWkhdUm4opFVBWWqtFERkxNDMpkWVgYaitJwSE4EqlQwoF1XKTJFJTSybovuxb-fdfjChVzs3-LhEUDSPEgBELiMFI1V6F4I3VnW-_oxfVkDU0aEaHaroUB0dKhEzdMyEyLYb4387_xe6Ow3aunazj7nzJM5SQokE9gPoA4A2</recordid><startdate>20121101</startdate><enddate>20121101</enddate><creator>Tang, Ming</creator><creator>Qiu, ZhenLong</creator><creator>Yang, Min</creator><creator>Cheng, PingPan</creator><creator>Gao, Si</creator><creator>Liu, ShuBo</creator><creator>Meng, QinShu</creator><general>SP Science China Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20121101</creationdate><title>Evolutionary ciphers against differential power analysis and differential fault analysis</title><author>Tang, Ming ; Qiu, ZhenLong ; Yang, Min ; Cheng, PingPan ; Gao, Si ; Liu, ShuBo ; Meng, QinShu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c342t-3a67ac24e215db235ff760680e28f5bd81a1bcf420e15dd5731246d53eb87a0f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithms</topic><topic>Computer Science</topic><topic>Cost analysis</topic><topic>Cryptography</topic><topic>Design</topic><topic>Encryption</topic><topic>Information Systems and Communication Service</topic><topic>Mathematical analysis</topic><topic>Random numbers</topic><topic>Research Paper</topic><topic>Search algorithms</topic><topic>Security</topic><topic>加密算法</topic><topic>实验基础</topic><topic>差分功耗分析</topic><topic>故障分析</topic><topic>智能搜索算法</topic><topic>演化密码</topic><topic>真随机数发生器</topic><topic>设计方法</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tang, Ming</creatorcontrib><creatorcontrib>Qiu, ZhenLong</creatorcontrib><creatorcontrib>Yang, Min</creatorcontrib><creatorcontrib>Cheng, PingPan</creatorcontrib><creatorcontrib>Gao, Si</creatorcontrib><creatorcontrib>Liu, ShuBo</creatorcontrib><creatorcontrib>Meng, QinShu</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tang, Ming</au><au>Qiu, ZhenLong</au><au>Yang, Min</au><au>Cheng, PingPan</au><au>Gao, Si</au><au>Liu, ShuBo</au><au>Meng, QinShu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Evolutionary ciphers against differential power analysis and differential fault analysis</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Inf. Sci</stitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><date>2012-11-01</date><risdate>2012</risdate><volume>55</volume><issue>11</issue><spage>2555</spage><epage>2569</epage><pages>2555-2569</pages><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>Side channel analysis(SCA) focuses on attacking cryptographic algorithm implementations by col- lecting leaked information and analyzing the correlation between the leaked and key information in the crypto- graphic system. Currently, SCA is the main threat to cryptographic implementations, with DPA (differential power analysis) and DFA (differential fault analysis) being two of the most threatening types of SCA. However, the existing countermeasures against DPA and DFA have shortcomings and can hardly protect cipher designs perfectly. Based on a comprehensive analysis of DPA and DFA, this paper proposes a new idea of using an evo- lutionary cipher (EVOC) against DPAs based on the model proposed by Kocher, and several different new types of DFAs. In fact, an EVOC is a kind of dynamic cipher designing method. Moreover, combined with intelligent searching algorithms and cryptography design policies, EVOCs utilize the dynamic and unpredictable properties of TRNG (a truly random number generator) to ensure cipher design at a high level of security. Therefore, with an EVOC we could design cryptography algorithms with high security to resist mathematical analysis as well as DPAs and DFAs. This paper analyzes and proves the security, efficiency, cost, and original features of EVOCs against DPA and DFA both theoretically and experimentally. Compared with existing countermeasures against SCAs, EVOCs use dynamic non-linear operations to destroy the bases of DPA and DFA. At the algorithm level, EVOCs are more efficient than other resistance methods. Based on the theory and experiments, this paper proposes certain modifications to the EVOC in the AES (advanced encryption standard) algorithm, which can be referenced by other dynamic designs of cryptographic algorithms.</abstract><cop>Heidelberg</cop><pub>SP Science China Press</pub><doi>10.1007/s11432-012-4615-6</doi><tpages>15</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1674-733X |
ispartof | Science China. Information sciences, 2012-11, Vol.55 (11), p.2555-2569 |
issn | 1674-733X 1869-1919 |
language | eng |
recordid | cdi_proquest_journals_2918611697 |
source | SpringerNature Journals; ProQuest Central UK/Ireland; Alma/SFX Local Collection; ProQuest Central |
subjects | Algorithms Computer Science Cost analysis Cryptography Design Encryption Information Systems and Communication Service Mathematical analysis Random numbers Research Paper Search algorithms Security 加密算法 实验基础 差分功耗分析 故障分析 智能搜索算法 演化密码 真随机数发生器 设计方法 |
title | Evolutionary ciphers against differential power analysis and differential fault analysis |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T12%3A08%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Evolutionary%20ciphers%20against%20differential%20power%20analysis%20and%20differential%20fault%20analysis&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Tang,%20Ming&rft.date=2012-11-01&rft.volume=55&rft.issue=11&rft.spage=2555&rft.epage=2569&rft.pages=2555-2569&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-012-4615-6&rft_dat=%3Cproquest_cross%3E2918611697%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918611697&rft_id=info:pmid/&rft_cqvip_id=43502071&rfr_iscdi=true |