Evolutionary ciphers against differential power analysis and differential fault analysis

Side channel analysis(SCA) focuses on attacking cryptographic algorithm implementations by col- lecting leaked information and analyzing the correlation between the leaked and key information in the crypto- graphic system. Currently, SCA is the main threat to cryptographic implementations, with DPA...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Science China. Information sciences 2012-11, Vol.55 (11), p.2555-2569
Hauptverfasser: Tang, Ming, Qiu, ZhenLong, Yang, Min, Cheng, PingPan, Gao, Si, Liu, ShuBo, Meng, QinShu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2569
container_issue 11
container_start_page 2555
container_title Science China. Information sciences
container_volume 55
creator Tang, Ming
Qiu, ZhenLong
Yang, Min
Cheng, PingPan
Gao, Si
Liu, ShuBo
Meng, QinShu
description Side channel analysis(SCA) focuses on attacking cryptographic algorithm implementations by col- lecting leaked information and analyzing the correlation between the leaked and key information in the crypto- graphic system. Currently, SCA is the main threat to cryptographic implementations, with DPA (differential power analysis) and DFA (differential fault analysis) being two of the most threatening types of SCA. However, the existing countermeasures against DPA and DFA have shortcomings and can hardly protect cipher designs perfectly. Based on a comprehensive analysis of DPA and DFA, this paper proposes a new idea of using an evo- lutionary cipher (EVOC) against DPAs based on the model proposed by Kocher, and several different new types of DFAs. In fact, an EVOC is a kind of dynamic cipher designing method. Moreover, combined with intelligent searching algorithms and cryptography design policies, EVOCs utilize the dynamic and unpredictable properties of TRNG (a truly random number generator) to ensure cipher design at a high level of security. Therefore, with an EVOC we could design cryptography algorithms with high security to resist mathematical analysis as well as DPAs and DFAs. This paper analyzes and proves the security, efficiency, cost, and original features of EVOCs against DPA and DFA both theoretically and experimentally. Compared with existing countermeasures against SCAs, EVOCs use dynamic non-linear operations to destroy the bases of DPA and DFA. At the algorithm level, EVOCs are more efficient than other resistance methods. Based on the theory and experiments, this paper proposes certain modifications to the EVOC in the AES (advanced encryption standard) algorithm, which can be referenced by other dynamic designs of cryptographic algorithms.
doi_str_mv 10.1007/s11432-012-4615-6
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918611697</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>43502071</cqvip_id><sourcerecordid>2918611697</sourcerecordid><originalsourceid>FETCH-LOGICAL-c342t-3a67ac24e215db235ff760680e28f5bd81a1bcf420e15dd5731246d53eb87a0f3</originalsourceid><addsrcrecordid>eNp9kEFLwzAUx4MoOOY-gLeK52hekibtUcZ0wsCLwm4hbZOtozZd0ir79mZ0TLyYSwLv93_v5YfQLZAHIEQ-BgDOKCZAMReQYnGBJpCJHEMO-WV8C8mxZGx9jWYh7Eg8jBEqswlaL75cM_S1a7U_JGXdbY0Pid7oug19UtXWGm_avtZN0rlv4xPd6uYQ6si01d-61UPTn-s36MrqJpjZ6Z6ij-fF-3yJV28vr_OnFS4Zpz1mWkhdUm4opFVBWWqtFERkxNDMpkWVgYaitJwSE4EqlQwoF1XKTJFJTSybovuxb-fdfjChVzs3-LhEUDSPEgBELiMFI1V6F4I3VnW-_oxfVkDU0aEaHaroUB0dKhEzdMyEyLYb4387_xe6Ow3aunazj7nzJM5SQokE9gPoA4A2</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918611697</pqid></control><display><type>article</type><title>Evolutionary ciphers against differential power analysis and differential fault analysis</title><source>SpringerNature Journals</source><source>ProQuest Central UK/Ireland</source><source>Alma/SFX Local Collection</source><source>ProQuest Central</source><creator>Tang, Ming ; Qiu, ZhenLong ; Yang, Min ; Cheng, PingPan ; Gao, Si ; Liu, ShuBo ; Meng, QinShu</creator><creatorcontrib>Tang, Ming ; Qiu, ZhenLong ; Yang, Min ; Cheng, PingPan ; Gao, Si ; Liu, ShuBo ; Meng, QinShu</creatorcontrib><description>Side channel analysis(SCA) focuses on attacking cryptographic algorithm implementations by col- lecting leaked information and analyzing the correlation between the leaked and key information in the crypto- graphic system. Currently, SCA is the main threat to cryptographic implementations, with DPA (differential power analysis) and DFA (differential fault analysis) being two of the most threatening types of SCA. However, the existing countermeasures against DPA and DFA have shortcomings and can hardly protect cipher designs perfectly. Based on a comprehensive analysis of DPA and DFA, this paper proposes a new idea of using an evo- lutionary cipher (EVOC) against DPAs based on the model proposed by Kocher, and several different new types of DFAs. In fact, an EVOC is a kind of dynamic cipher designing method. Moreover, combined with intelligent searching algorithms and cryptography design policies, EVOCs utilize the dynamic and unpredictable properties of TRNG (a truly random number generator) to ensure cipher design at a high level of security. Therefore, with an EVOC we could design cryptography algorithms with high security to resist mathematical analysis as well as DPAs and DFAs. This paper analyzes and proves the security, efficiency, cost, and original features of EVOCs against DPA and DFA both theoretically and experimentally. Compared with existing countermeasures against SCAs, EVOCs use dynamic non-linear operations to destroy the bases of DPA and DFA. At the algorithm level, EVOCs are more efficient than other resistance methods. Based on the theory and experiments, this paper proposes certain modifications to the EVOC in the AES (advanced encryption standard) algorithm, which can be referenced by other dynamic designs of cryptographic algorithms.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-012-4615-6</identifier><language>eng</language><publisher>Heidelberg: SP Science China Press</publisher><subject>Algorithms ; Computer Science ; Cost analysis ; Cryptography ; Design ; Encryption ; Information Systems and Communication Service ; Mathematical analysis ; Random numbers ; Research Paper ; Search algorithms ; Security ; 加密算法 ; 实验基础 ; 差分功耗分析 ; 故障分析 ; 智能搜索算法 ; 演化密码 ; 真随机数发生器 ; 设计方法</subject><ispartof>Science China. Information sciences, 2012-11, Vol.55 (11), p.2555-2569</ispartof><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2012</rights><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2012.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c342t-3a67ac24e215db235ff760680e28f5bd81a1bcf420e15dd5731246d53eb87a0f3</citedby><cites>FETCH-LOGICAL-c342t-3a67ac24e215db235ff760680e28f5bd81a1bcf420e15dd5731246d53eb87a0f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009A/84009A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-012-4615-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918611697?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Tang, Ming</creatorcontrib><creatorcontrib>Qiu, ZhenLong</creatorcontrib><creatorcontrib>Yang, Min</creatorcontrib><creatorcontrib>Cheng, PingPan</creatorcontrib><creatorcontrib>Gao, Si</creatorcontrib><creatorcontrib>Liu, ShuBo</creatorcontrib><creatorcontrib>Meng, QinShu</creatorcontrib><title>Evolutionary ciphers against differential power analysis and differential fault analysis</title><title>Science China. Information sciences</title><addtitle>Sci. China Inf. Sci</addtitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><description>Side channel analysis(SCA) focuses on attacking cryptographic algorithm implementations by col- lecting leaked information and analyzing the correlation between the leaked and key information in the crypto- graphic system. Currently, SCA is the main threat to cryptographic implementations, with DPA (differential power analysis) and DFA (differential fault analysis) being two of the most threatening types of SCA. However, the existing countermeasures against DPA and DFA have shortcomings and can hardly protect cipher designs perfectly. Based on a comprehensive analysis of DPA and DFA, this paper proposes a new idea of using an evo- lutionary cipher (EVOC) against DPAs based on the model proposed by Kocher, and several different new types of DFAs. In fact, an EVOC is a kind of dynamic cipher designing method. Moreover, combined with intelligent searching algorithms and cryptography design policies, EVOCs utilize the dynamic and unpredictable properties of TRNG (a truly random number generator) to ensure cipher design at a high level of security. Therefore, with an EVOC we could design cryptography algorithms with high security to resist mathematical analysis as well as DPAs and DFAs. This paper analyzes and proves the security, efficiency, cost, and original features of EVOCs against DPA and DFA both theoretically and experimentally. Compared with existing countermeasures against SCAs, EVOCs use dynamic non-linear operations to destroy the bases of DPA and DFA. At the algorithm level, EVOCs are more efficient than other resistance methods. Based on the theory and experiments, this paper proposes certain modifications to the EVOC in the AES (advanced encryption standard) algorithm, which can be referenced by other dynamic designs of cryptographic algorithms.</description><subject>Algorithms</subject><subject>Computer Science</subject><subject>Cost analysis</subject><subject>Cryptography</subject><subject>Design</subject><subject>Encryption</subject><subject>Information Systems and Communication Service</subject><subject>Mathematical analysis</subject><subject>Random numbers</subject><subject>Research Paper</subject><subject>Search algorithms</subject><subject>Security</subject><subject>加密算法</subject><subject>实验基础</subject><subject>差分功耗分析</subject><subject>故障分析</subject><subject>智能搜索算法</subject><subject>演化密码</subject><subject>真随机数发生器</subject><subject>设计方法</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kEFLwzAUx4MoOOY-gLeK52hekibtUcZ0wsCLwm4hbZOtozZd0ir79mZ0TLyYSwLv93_v5YfQLZAHIEQ-BgDOKCZAMReQYnGBJpCJHEMO-WV8C8mxZGx9jWYh7Eg8jBEqswlaL75cM_S1a7U_JGXdbY0Pid7oug19UtXWGm_avtZN0rlv4xPd6uYQ6si01d-61UPTn-s36MrqJpjZ6Z6ij-fF-3yJV28vr_OnFS4Zpz1mWkhdUm4opFVBWWqtFERkxNDMpkWVgYaitJwSE4EqlQwoF1XKTJFJTSybovuxb-fdfjChVzs3-LhEUDSPEgBELiMFI1V6F4I3VnW-_oxfVkDU0aEaHaroUB0dKhEzdMyEyLYb4387_xe6Ow3aunazj7nzJM5SQokE9gPoA4A2</recordid><startdate>20121101</startdate><enddate>20121101</enddate><creator>Tang, Ming</creator><creator>Qiu, ZhenLong</creator><creator>Yang, Min</creator><creator>Cheng, PingPan</creator><creator>Gao, Si</creator><creator>Liu, ShuBo</creator><creator>Meng, QinShu</creator><general>SP Science China Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20121101</creationdate><title>Evolutionary ciphers against differential power analysis and differential fault analysis</title><author>Tang, Ming ; Qiu, ZhenLong ; Yang, Min ; Cheng, PingPan ; Gao, Si ; Liu, ShuBo ; Meng, QinShu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c342t-3a67ac24e215db235ff760680e28f5bd81a1bcf420e15dd5731246d53eb87a0f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithms</topic><topic>Computer Science</topic><topic>Cost analysis</topic><topic>Cryptography</topic><topic>Design</topic><topic>Encryption</topic><topic>Information Systems and Communication Service</topic><topic>Mathematical analysis</topic><topic>Random numbers</topic><topic>Research Paper</topic><topic>Search algorithms</topic><topic>Security</topic><topic>加密算法</topic><topic>实验基础</topic><topic>差分功耗分析</topic><topic>故障分析</topic><topic>智能搜索算法</topic><topic>演化密码</topic><topic>真随机数发生器</topic><topic>设计方法</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tang, Ming</creatorcontrib><creatorcontrib>Qiu, ZhenLong</creatorcontrib><creatorcontrib>Yang, Min</creatorcontrib><creatorcontrib>Cheng, PingPan</creatorcontrib><creatorcontrib>Gao, Si</creatorcontrib><creatorcontrib>Liu, ShuBo</creatorcontrib><creatorcontrib>Meng, QinShu</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tang, Ming</au><au>Qiu, ZhenLong</au><au>Yang, Min</au><au>Cheng, PingPan</au><au>Gao, Si</au><au>Liu, ShuBo</au><au>Meng, QinShu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Evolutionary ciphers against differential power analysis and differential fault analysis</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Inf. Sci</stitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><date>2012-11-01</date><risdate>2012</risdate><volume>55</volume><issue>11</issue><spage>2555</spage><epage>2569</epage><pages>2555-2569</pages><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>Side channel analysis(SCA) focuses on attacking cryptographic algorithm implementations by col- lecting leaked information and analyzing the correlation between the leaked and key information in the crypto- graphic system. Currently, SCA is the main threat to cryptographic implementations, with DPA (differential power analysis) and DFA (differential fault analysis) being two of the most threatening types of SCA. However, the existing countermeasures against DPA and DFA have shortcomings and can hardly protect cipher designs perfectly. Based on a comprehensive analysis of DPA and DFA, this paper proposes a new idea of using an evo- lutionary cipher (EVOC) against DPAs based on the model proposed by Kocher, and several different new types of DFAs. In fact, an EVOC is a kind of dynamic cipher designing method. Moreover, combined with intelligent searching algorithms and cryptography design policies, EVOCs utilize the dynamic and unpredictable properties of TRNG (a truly random number generator) to ensure cipher design at a high level of security. Therefore, with an EVOC we could design cryptography algorithms with high security to resist mathematical analysis as well as DPAs and DFAs. This paper analyzes and proves the security, efficiency, cost, and original features of EVOCs against DPA and DFA both theoretically and experimentally. Compared with existing countermeasures against SCAs, EVOCs use dynamic non-linear operations to destroy the bases of DPA and DFA. At the algorithm level, EVOCs are more efficient than other resistance methods. Based on the theory and experiments, this paper proposes certain modifications to the EVOC in the AES (advanced encryption standard) algorithm, which can be referenced by other dynamic designs of cryptographic algorithms.</abstract><cop>Heidelberg</cop><pub>SP Science China Press</pub><doi>10.1007/s11432-012-4615-6</doi><tpages>15</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1674-733X
ispartof Science China. Information sciences, 2012-11, Vol.55 (11), p.2555-2569
issn 1674-733X
1869-1919
language eng
recordid cdi_proquest_journals_2918611697
source SpringerNature Journals; ProQuest Central UK/Ireland; Alma/SFX Local Collection; ProQuest Central
subjects Algorithms
Computer Science
Cost analysis
Cryptography
Design
Encryption
Information Systems and Communication Service
Mathematical analysis
Random numbers
Research Paper
Search algorithms
Security
加密算法
实验基础
差分功耗分析
故障分析
智能搜索算法
演化密码
真随机数发生器
设计方法
title Evolutionary ciphers against differential power analysis and differential fault analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T12%3A08%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Evolutionary%20ciphers%20against%20differential%20power%20analysis%20and%20differential%20fault%20analysis&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Tang,%20Ming&rft.date=2012-11-01&rft.volume=55&rft.issue=11&rft.spage=2555&rft.epage=2569&rft.pages=2555-2569&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-012-4615-6&rft_dat=%3Cproquest_cross%3E2918611697%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918611697&rft_id=info:pmid/&rft_cqvip_id=43502071&rfr_iscdi=true