当前位置:主页 > 科技论文 > 网络通信论文 >

基于机器学习的密码芯片电磁攻击技术研究

发布时间:2018-01-09 07:16

  本文关键词:基于机器学习的密码芯片电磁攻击技术研究 出处:《北京邮电大学》2014年博士论文 论文类型:学位论文


  更多相关文章: 模板攻击 电磁分析 支撑向量机 线性回归 标准化类间方差


【摘要】:机器学习已经成为整个计算机领域中最活跃、应用潜力最明显的技术之一,它在人脸检测、语音识别等方面均获得了成功应用。近年来,国内外部分学者将机器学习的方法引入密码设计与分析学的研究领域,在为该领域注入新的活力的同时,也为密码学与机器学习的综合交叉发展,开辟了新的方向——基于机器学习的侧信道攻击。 信息系统是否安全取决于系统中最弱的组成部件,这使得密码算法即使在数学理论上安全,也可能由于其不恰当的物理实现导致风险。侧信道攻击正是根据这一原理而实施的有效攻击技术,利用密码算法的执行载体——密码芯片运算过程中泄露的各种物理信息(如功耗、电磁辐射、声音、可见光等)来破解密钥。相比于传统的密码分析方法,侧信道攻击技术的优点在于具有较小的密钥搜索空间和较好的分析效率。而机器学习能像人一样通过经验不断改善和提高自身性能。所以基于机器学习的侧信道攻击对于提高攻击的可靠性和自动化水平有重要意义。目前该领域的研究工作仍然处于探索阶段,许多有意义的问题有待深入探讨。 相比于其它侧信道攻击方法,电磁攻击在攻击过程中无需与密码系统直接进行电气连接,具有隐蔽性强和难以被察觉等优点。本文以常用的密码算法为攻击对象,以电磁辐射探测为主要测试手段,将机器学习的方法应用到侧信道攻击中来,取得以下主要研究结果: (1)针对传统模板攻击方法必须已知明文或密文的缺点,提出了一种直接以密钥为目标的单比特模板攻击方法,该方法不仅可以减少需要构建的模板数量,降低了计算复杂度,而且能够利用更多的训练数据,但是由于没有考虑明文的影响,导致分类准确率偏低,为此进一步提出将攻击区域定位在密钥扩展阶段。通过对单片机上实现的DES密码算法的电磁模板攻击实验表明,该方法在未知明文(密文)的情况下,只需要1条测试曲线,就可以完全正确的推断出密钥。 (2)为了避免模板攻击运算中出现协方差矩阵“病态”和数值超出浮点数表示范围等问题,本文在保证模板匹配概率前后顺序不变的前提下,通过多项式简化和变换实现了一种快速的模板攻击方法,该方法使用公共协方差矩阵代替协方差矩阵,不仅可以放松协方差矩阵可逆的限制条件,而且由于更接近真实协方差矩阵,在降低计算复杂度的同时,提高了攻击成功率。通过协方差矩阵、公共协方差矩阵、单位矩阵的对比实验,证明了该方法的有效性。 (3)针对有监督学习中常见的高维数、小样本问题,首先结合选择和特征提取算法的优点,提出了一种新的降维方法SPP,然后利用汉明重量模型天然具有次序性的特点,提出了一种新的SVM多分类器,将需要训练的二分类器数量从K(K-1)/2减少到K个。通过攻击执行DES软件实现的8位单片机,实验结果表明SPP方法优于PCA方法,多分类SVM攻击优于模板攻击。 (4)有监督学习需要大量具有标记的训练数据,而在实际情况下要得到这样的完备数据集非常困难。为此本文提出了一种无监督的攻击方法。该方法首先建立密码设备线性回归模型,然后利用最小二乘法求出模型参数,为了量化估计误差,需要在每个抽样点计算多重可决系数来评价模型的拟合优度。最后为了消除“奇异尖峰”的干扰,提出了一种利用标准化类间方差进行修正的方法。实验结果证明了该方法的有效性。
[Abstract]:Machine learning has become one of the most active fields in the computer, one of the most obvious application potential of the technology, it in face detection, speech recognition and other aspects for the successful application. In recent years, some scholars at home and abroad research field of machine learning method is introduced into the design and analysis of cryptography, in the field of inject new vitality at the same time, a comprehensive cross development for cryptography and machine learning, open up a new direction: Based on side channel attacks of machine learning.
Part of the information system security depends on whether the system is in the weakest, which makes the encryption algorithm security even in mathematical theory, it may be due to the inappropriate physical risk. Side channel attack is based on the principle and the implementation of effective attack techniques, using the execution of various physical information leakage in the operation process of cryptographic chip the carrier of cryptographic algorithms (such as power consumption, electromagnetic radiation, visible light sound, etc.) to crack the key. Compared to the traditional password analysis method, the advantages of side channel attack technology is the key search space is smaller and better efficiency. Analysis and machine learning to like people through experience and constantly improve and enhance their performance so based on side channel attack attack machine learning to improve the reliability and automation level has important significance. The current research work in this field is still in At the exploratory stage, many meaningful questions need to be discussed.
Compared to the other side channel attack, electromagnetic attack in the attack process without direct electrical connection with the password system, with strong concealment and are difficult to detect. In this paper, the advantages of cryptographic algorithms commonly used for the object of attack, with electromagnetic radiation detection as the main means of testing, the machine learning method is applied to the side channel attack in the past, the main results are as following:
(1) the traditional template attack method must be known plaintext or ciphertext shortcomings, proposes a method for directly to key target monobit template attack, this method can not only reduce the number of template construction to reduce the computational complexity, but also can use the training data more, but due to not considering the plaintext in effect, the classification accuracy is low, therefore further proposed to attack regional positioning in the key expansion stage. Through the experiment of electromagnetic template attack of DES algorithm to achieve the show that the method in the case of Zhi Mingwen (ciphertext), only 1 test curve, can be completely correct to infer the key.
(2) in order to avoid the template attack operation covariance matrix is "sick" and the value is out of range of issues such as floating point representation, based on the template matching to ensure the order before and after the premise probability at the same time, through the polynomial simplification and transformation to achieve a fast template attack method, this method uses a common covariance matrix instead of the covariance matrix, not only can relax the restrictions of covariance matrix invertible, and the closer to the true covariance matrix, the computation complexity while reducing, improve the success rate of attacks. The public covariance matrix, covariance matrix, experimental unit matrix, proves the validity of the method.
(3) for supervised learning in high dimension, small sample problem, combined with the advantages of first selection and feature extraction algorithm, proposes a dimensionality reduction method of the new SPP, and then the natural order has the characteristics of Hamming weight model, this paper proposes a new SVM multi classifier, number two the classifier will need training from K (K-1) /2 reduced to K. Through the execution of the attack 8 bit microcontroller DES software, the experimental results show that SPP method is better than the PCA method, multi classification of SVM attacks is better than the template attack.
(4) supervised learning needs a large amount of training data is labeled, and in actual situation to get a complete set of such data is very difficult. This paper proposes an unsupervised method of attack. The method firstly builds a cryptographic device linear regression model, and then use the minimum two multiplication to calculate the parameters of the model, in order to quantitatively estimate error, need to calculate the fitting multiple coefficient of determination to evaluate the goodness of the model at each sampling point. Finally, in order to eliminate interference of singular peak ", put forward a correction method using standard variance. The experimental results demonstrate the effectiveness of the method.

【学位授予单位】:北京邮电大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TN918.1

【参考文献】

相关期刊论文 前10条

1 柳琰;;直面新型网络武器威胁 果断采取保密防护措施[J];保密科学技术;2012年08期

2 张鹏;邓高明;陈开颜;赵强;;针对AES密码芯片的远场相关性电磁分析攻击[J];华中科技大学学报(自然科学版);2009年08期

3 张文涛 ,卿斯汉 ,吴文玲;对低轮SAFER++的差分-非线性密码分析[J];计算机研究与发展;2003年06期

4 韩军;曾晓洋;汤庭鳌;;基于时间随机化的密码芯片防攻击方法[J];计算机工程;2007年02期

5 邓高明;赵强;张鹏;陈开颜;刘晓芹;;针对密码芯片的电磁频域模板分析攻击[J];计算机学报;2009年04期

6 丁国良;李志祥;尹文龙;赵强;;高级数据加密标准的差分电磁分析[J];计算机应用;2009年08期

7 邓高明;张鹏;赵强;陈开颜;;基于PCA和SVM的电磁模板分析攻击[J];计算机测量与控制;2009年09期

8 周建钦;何凌云;;DES加密算法的密钥扩展[J];科技通报;2011年02期

9 武传坤;;棱镜折射出了什么?[J];科学世界;2013年08期

10 贺也平,吴文玲,卿斯汉;截断差分-线性密码分析[J];软件学报;2000年10期

相关博士学位论文 前3条

1 乐大珩;抗功耗攻击的密码芯片电路级防护关键技术研究[D];国防科学技术大学;2011年

2 张涛;面向密码芯片的旁路攻击关键技术研究[D];电子科技大学;2008年

3 孙春辉;边信道攻击及防御的研究与实现[D];西安电子科技大学;2012年



本文编号:1400478

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/wltx/1400478.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户80006***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com