CN109921892A - A kind of various dimensions side channel leakage appraisal procedure and system based on test vector - Google Patents
A kind of various dimensions side channel leakage appraisal procedure and system based on test vector Download PDFInfo
- Publication number
- CN109921892A CN109921892A CN201910035749.2A CN201910035749A CN109921892A CN 109921892 A CN109921892 A CN 109921892A CN 201910035749 A CN201910035749 A CN 201910035749A CN 109921892 A CN109921892 A CN 109921892A
- Authority
- CN
- China
- Prior art keywords
- side channel
- data set
- evaluation
- size
- leakage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012360 testing method Methods 0.000 title claims abstract description 54
- 239000013598 vector Substances 0.000 title claims abstract description 47
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000011156 evaluation Methods 0.000 claims description 95
- 238000012353 t test Methods 0.000 claims description 22
- 238000004220 aggregation Methods 0.000 claims 4
- 230000002776 aggregation Effects 0.000 claims 4
- 238000000692 Student's t-test Methods 0.000 description 16
- 238000010586 diagram Methods 0.000 description 6
- 238000009826 distribution Methods 0.000 description 6
- 238000005315 distribution function Methods 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 230000001186 cumulative effect Effects 0.000 description 4
- 238000001790 Welch's t-test Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000012854 evaluation process Methods 0.000 description 3
- 238000003306 harvesting Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to a kind of various dimensions side channel leakage appraisal procedure and system based on test vector.This method comprises: formulating data set size, acquisition and assessment energy waveform, acquisition and assessment electromagnetic waveforms and acquisition and assessment encryption times data four-stage.The present invention realizes the assessment to energy, electromagnetism and the various dimensions of time side channel leakage by improving and expanding test vector appraisal procedure and formulate more reasonable secure threshold.Moreover, the present invention greatly reduce implement side channel estimation technical threshold and assessment the time, compared to traditional side channel estimation method, can be more simple and quick obtain assessment result.
Description
Technical Field
The invention relates to the technical field of information security, in particular to an evaluation method and an evaluation system for evaluating multi-type side channel leakage of a cryptographic module or equipment based on a test vector.
Background
Many security standards require cryptographic devices and cryptographic modules to be resistant to side channel attacks, such as time analysis, energy analysis, and electromagnetic analysis. However, the existing evaluation method requires the evaluation laboratory to implement the most advanced and comprehensive attack method on the tested device during testing, which greatly increases the technical threshold and evaluation period of the evaluation work. For the above reasons, the National Institute of Standards and Technology (NIST) has called "non-invasive attack testing seminar" in 2011 to obtain a testing method that can reliably evaluate the physical security vulnerability of the encrypted device and is easy to implement.
In a large meeting, Goodwill et al proposed a more versatile and easily implemented method called test vector leakage assessment (see g. Goodwill, b.jun, j.jaffe, p. rohatgi. a testing method for channel resistance evaluation. in NIST Non-Invasive access testing works, 2011). The test vector evaluation method uses t detection to evaluate whether the probability distribution of the collected data set has significant difference, and is not only fast, reliable and simple, but also effective in various types of side channel leakage evaluation from the theoretical analysis.
One fundamental problem in many different scientific fields is whether the two sets of data differ significantly from each other. The most common method of answering this question is Welch's t-test, which follows a t-distribution. the purpose of the t-test is to provide quantitative values as the probability that the two sets of population distributions are not identical. In other words, the t-test gives the probability of testing the validity of the null hypothesis (hypothesis: samples in both groups are drawn from the same population, i.e., the two groups are indistinguishable).
Thus, let Q0And Q1Representing two sets of sets being tested. Suppose μ0(corresponds to μ1) And s0 2(corresponds to s)1 2) Respectively represent Q0And Q1Sample mean and sample standard deviation of (2), n0And n1Representing the cardinality of each set. The t detection value and the degree of freedom v are calculated by the following two equations:
at s0≈s1And n0≈n1In this case, the equation can be given by v ≈ n0+n1The degrees of freedom are calculated as n. Finally, the probability of receiving a null hypothesis is estimated by the t-distribution density function. In other words, the student's t-distribution function is plotted based on the degree of freedom v:
here, Γ (·) denotes a gamma function. Based on t test of two-tailed Welch, the probability calculation formula of the negative hypothesis is as follows:
FIG. 1 of the accompanying drawings is a graphical representation of a probability density function for a t-test.
Alternatively, a corresponding cumulative distribution function may be used:
wherein,2F1(..; -. is a hyper-geometric function. Thus, the probability of a negative hypothesis can be written as:
p=2F(-|t|,v)
figure 2 of the accompanying drawings is a graphical representation of the cumulative distribution function of the t-test.
Thus, a small value of p (or a large value of t) provides evidence of rejection of the null hypothesis, leading to the conclusion that: these collections come from different populations. Typically, a threshold | t | > 4.5 is defined to reject the original hypothesis without regard to the degrees of freedom and the cumulative distribution function described above. This simple definition is based on the following calculations: p-2F (-4.5, v >1000) < 0.00001. This calculation indicates a confidence of >0.99999 for rejection of the null hypothesis.
With Welch's t-test, we can evaluate side channel leakage of a cryptographic module or device, i.e., test vector evaluation methods. The specific method comprises the following steps: firstly, collecting two groups of side channel information, wherein one group is generated by inputting fixed plaintext, and the other group is generated by random plaintext; then, welch's t-test was performed on both sets of signals to obtain t-values. Finally, the size of the t value determines whether the two sets come from the same distribution. If the value of t is too large, it indicates that the two sets come from different distributions, i.e. the side channel leakage amount is too large.
In recent years, research work on side channel leakage evaluation by using a test vector method has been increasing, but current research mainly focuses on a single energy/electromagnetic leakage direction, and evaluation of multiple types of side channel leakage types (such as encrypted time data) only theoretically proves the feasibility of the side channel leakage evaluation and has no feasible implementation scheme. In addition, when the energy/electromagnetic leakage is evaluated by using a test vector evaluation method, a safety threshold is usually set to be | t | > 4.5, but the safety threshold is not suitable for side channel evaluation of encryption time data. Therefore, the establishment of a security threshold for the encrypted time data needs to be distinguished from energy/electromagnetic signals.
Disclosure of Invention
The invention realizes the evaluation of multi-dimensional (energy/electromagnetism and time) side channel leakage data of a cryptographic module or equipment by using a test vector evaluation method, and aims to provide a method and a system which are quick, reliable and simple and are effective in multi-dimensional side channel leakage evaluation.
In order to achieve the purpose, the whole evaluation process is divided into four stages: which comprises the following steps: formulating a data set size; collecting and evaluating an energy waveform; collecting and evaluating electromagnetic waveforms; encryption time data is collected and evaluated. Fig. 3 shows an evaluation flow of the entire multi-dimensional side channel leakage evaluation method based on the test vector.
In the stage of setting the size of the data set, the size of the collected data set is determined according to the security level expected by the tested password module or the equipment manufacturer, and N is used respectivelyp、NeAnd NtNumber representing energy waveform, electromagnetic waveform and encryption time to be collectedAmount of the compound (A).
In the stage of collecting and evaluating energy waveform, firstly, collecting NpStrip fixed plaintext and NpA random plaintext energy waveform; then, carrying out t test on energy waveform data of random plaintext and fixed plaintext at a time point where leakage possibly occurs; and finally, comparing the absolute value of the obtained t value with a safety threshold value to obtain the conclusion whether the energy side channel leakage is excessive.
In the stage of collecting and evaluating electromagnetic waveform, firstly, N is collectedeStrip fixed plaintext and NeElectromagnetic waveform of a random plaintext; then, performing t-test on the electromagnetic waveform data of the random plaintext and the fixed plaintext at a time point when leakage is possible; and finally, comparing the obtained absolute value of the t value with a safety threshold value to obtain a conclusion whether the electromagnetic side channel leakage is excessive.
In the stage of collecting and evaluating enciphered time data, firstly, collecting NtA fixed plaintext and NtEncryption time data of a random plaintext; then, carrying out t test on the encryption time data of the random plaintext and the fixed plaintext; and finally, comparing the absolute value of the obtained t value with a safety threshold value to obtain a conclusion whether the time side channel leakage is excessive.
Specifically, the whole evaluation process is divided into four stages, namely, the step of making a data set, the step of acquiring an energy waveform and evaluating, the step of acquiring an electromagnetic waveform and evaluating, and the step of acquiring encryption time data and evaluating, wherein the step of making the data set, the step of acquiring the energy waveform and evaluating, the step of acquiring the electromagnetic waveform and evaluating, and the step of acquiring the encryption time data and evaluating comprises the following steps:
(1) a data set size is formulated.
(2) Energy waveforms are collected and evaluated.
(3) Electromagnetic waveforms are collected and evaluated.
(4) Encryption time data is collected and evaluated.
Further, the step (1) of formulating the size of the data set comprises the following steps:
step 1.1: determining the size of the data set of the waveform of the channel on the energy acquisition side, i.e. N, according to the security level expected by the cryptographic module or the equipment manufacturer to be testedpThe value of (c).
Step 1.2: determining the size of the data set for collecting the electromagnetic side channel waveform, namely N, according to the security level expected by the tested cryptographic module or the equipment manufacturereThe value of (c).
Step 1.3: and determining the size of the data set of the acquisition encryption time, namely the value of Nt according to the security level expected by the tested cryptographic module or equipment manufacturer.
Further, in step 1.1, when the security level is one level, the data set size N is set to be one levelp5000 a; data set size N with a second level of securityp10000 ═ 10000; when the security level is three levels, the data set size Np=20000。
Further, in step 1.2, when the security level is one level, the size N of the data set is sete5000 a; data set size N with a second level of securitye10000 ═ 10000; when the security level is three levels, the data set size Ne=20000。
Further, in step 1.3, when the security level is one level, the size N of the data set is sett10000 ═ 10000; data set size N with a second level of securityt100000; when the security level is three levels, the data set size Nt=1000000。
Further, the (2) acquiring and evaluating the energy waveform comprises the following steps:
step 2.1: and acquiring the energy side channel waveform according to the determined data set size of the acquired energy side channel waveform.
Step 2.2: and evaluating based on the test vector by using the acquired energy side channel waveform data, and comparing with a safety threshold.
Further, in the step 2.1, acquiring the energy side channel waveform is performed according to the following steps:
first, acquiring energy side channel waveforms of n fixed plaintext inputs, for example, selecting the fixed plaintext as: 0xda39a3ee5e6b4b0d3255bfef 95601890.
In the second step, the energy side channel waveforms of n random plaintext inputs are collected, for example, the random plaintext is from input 0x00000000000000000000000000000000, and the output of each encryption is the input of the next encryption.
Further, in step 2.2, the energy-side channel waveform collected is evaluated based on the test vector, and the following steps are performed:
in the first step, a curve of t-test values of the two sets, which varies with the number of elements of the sets, is calculated.
And secondly, comparing the energy leakage with a safety threshold value to obtain a single evaluation result of the energy leakage.
Further, the step (3) of collecting and evaluating the electromagnetic waveform comprises the following steps:
step 1: and acquiring the electromagnetic side channel waveform according to the determined size of the data set for acquiring the electromagnetic side channel waveform.
Step 2: and evaluating based on the test vector by using the acquired electromagnetic side channel waveform data, and comparing with a safety threshold.
Further, in the step 1, acquiring the electromagnetic side channel waveform is performed according to the following steps:
first, acquiring electromagnetic side channel waveforms of n fixed plaintext inputs, for example, selecting the fixed plaintext as: 0xda39a3ee5e6b4b0d3255bfef 95601890.
In the second step, the electromagnetic side channel waveforms of n random plaintext inputs are collected, for example, the random plaintext is from input 0x00000000000000000000000000000000, and the output of each encryption is the next encrypted input.
Further, in step 2, the collected electromagnetic side channel waveform is evaluated based on the test vector, and the method is operated according to the following steps:
in the first step, a curve of t-test values of the two sets, which varies with the number of elements of the sets, is calculated.
And secondly, comparing the electromagnetic leakage with a safety threshold value to obtain a single evaluation result of the electromagnetic leakage.
Further, the step (4) of collecting and evaluating the encryption time data comprises the following steps:
step 1: and acquiring encryption time data according to the determined size of the data set for acquiring the encryption time.
Step 2: and evaluating based on the test vector by using the acquired encryption time data, and comparing with a safety threshold.
Further, in the step 1, collecting the encryption time data is performed according to the following steps:
first, single encryption time data of fixed plaintext is collected, for example, the fixed plaintext input is selected as: 0xda39a3ee5e6b4b0d3255bfef 95601890.
In the second step, single encryption time data of random plaintext is collected, for example, the random plaintext starts from input 0x00000000000000000000000000000000, and the output of each encryption is the input of the next encryption.
Further, in step 2, the evaluation based on the test vector is performed on the encrypted time data, and the method is performed according to the following steps:
in the first step, a curve of t-test values of the two sets, which varies with the number of elements of the sets, is calculated.
And secondly, comparing the time leakage with a safety threshold value to obtain a single evaluation result of the time leakage.
Further, through repeated experiments and verification, the safety threshold of the encryption time data is determined to be | t | >12, and the safety threshold is considered to be more reasonable and effective for evaluating the encryption time data. Table 1 below is the safety threshold determined by the present invention:
table 1: safety threshold for three different types of leakage
Type of leakage | Safety threshold |
Energy waveform | Sp=4.5 |
Electromagnetic wave form | Se=4.5 |
Encrypting time data | St=12 |
Correspondingly to the above method, the present invention further provides a multi-dimensional side channel leakage evaluation system based on test vectors, which includes:
the data set determining module is used for determining the size of the data set of each evaluation category according to the expected security level of the tested password module or equipment;
the first dimension side channel leakage evaluation module is used for acquiring an energy waveform according to the size of the data set determined by the data set determination module and evaluating the energy side channel leakage;
the second dimension side channel leakage evaluation module is used for acquiring electromagnetic waveforms according to the size of the data set determined by the data set determination module and performing electromagnetic side channel leakage evaluation;
the third dimension side channel leakage evaluation module is used for acquiring encryption time data according to the size of the data set determined by the data set determination module and evaluating the leakage of the encryption time;
and the evaluation result output module is used for combining the evaluation results of the first dimension side channel leakage evaluation module, the second dimension side channel leakage evaluation module and the third dimension side channel leakage evaluation module to obtain and output a multi-dimension side channel leakage evaluation result.
Compared with the prior art, the invention has the following characteristics and beneficial effects:
firstly, the invention formulates a more reasonable classification safety threshold value by improving and expanding the test vector evaluation method, not only can effectively evaluate the side channel leakage of the energy/electromagnetic waveform of the cryptographic module or equipment, but also is very effective on the side channel leakage of the encryption time, and realizes the evaluation on the multi-dimensional side channel leakage.
Secondly, the invention greatly reduces the technical threshold and the evaluation time for evaluation implementation through the application of t detection and the optimization of the whole test process, and compared with the traditional side channel evaluation method, the method is easier to implement and can obtain the result more quickly.
Drawings
FIG. 1 is a graph of a probability density function for a t-test;
FIG. 2 is a graph of the cumulative distribution function of the t-test;
FIG. 3 is a general flowchart of a multi-dimensional side channel leakage assessment method based on test vectors;
FIG. 4 is a detailed flow chart of determining a size of a data set;
FIG. 5 is a detailed flow chart of acquiring and evaluating an energy waveform;
FIG. 6 is a diagram of an example of energy waveform evaluation based on test vectors;
FIG. 7 is a detailed flow chart of the acquisition and evaluation of electromagnetic waveforms;
FIG. 8 is a diagram of an example of electromagnetic waveform evaluation based on test vectors;
FIG. 9 is a detailed flow chart of the collection and evaluation of encrypted time data;
fig. 10 is a diagram of an example of evaluation of encrypted time data based on test vectors.
The specific implementation mode is as follows:
the invention is further described below with reference to the accompanying drawings.
The general flow of the multi-dimensional side channel leakage assessment method based on the test vector is shown in fig. 3. The whole evaluation process is mainly divided into 4 stages, namely determining the size of a data set, acquiring and evaluating an energy waveform, acquiring and evaluating an electromagnetic waveform and acquiring and evaluating encryption time data.
FIG. 4 is a detailed flow chart of the first stage of the present invention "determining data set size". Wherein N ispRepresenting the number of acquired energy waveforms, NeRepresenting the number of acquired sets of electromagnetic waveforms, NtRepresenting the amount of data collected for a set of encryption times. The first stage "determine dataset size" step is described in detail below.
Step 1: the level of security evaluated is determined according to the manufacturer's desires. If the manufacturer expects the product to reach the level of 'general safety', setting the evaluation safety level to be 1; if the manufacturer expects the product to reach the 'very safe' level, setting the evaluation safety level to be 2; if the manufacturer desires the own product to reach an "extremely safe" level, the evaluation security level is set to 3.
Step 2: when the evaluation security level is 1, N is determinedp=5000,Ne=5000,Nt10000 ═ 10000; when the evaluation security level is 2, N is determinedp=10000,Ne=10000,Nt100000; when the evaluation security level is 3, N is determinedp=20000,Ne=20000,Nt=1000000。
And step 3: respectively according to Np、NeAnd NtDetermines the amount of energy waveform, electromagnetic waveform, and encryption time that needs to be acquired.
FIG. 5 is a detailed flow chart of the second stage "harvesting and evaluating an energy waveform" of the present invention, and the following describes the steps of the second stage "harvesting and evaluating an energy waveform" in detail.
Step 1: the fixed plaintext is input, i.e. each time the input is encrypted 0xda39a3ee5e6b4b0d3255bfef95601890, and the N is acquired with an oscilloscopepThe bar energy waveform.
Step 2: inputting random plaintext, starting from input 0x00000000000000000000000000000000, the output of each encryption being the input of the next encryption, and acquiring N by using an oscilloscopepThe bar energy waveform.
And step 3: determining a time point of possible leakage on two groups of waveforms, and independently extracting data of the time point on all the waveforms to obtain two waveforms with NpA collection of individual elements.
And 4, step 4: starting from the element in the sample of 10, the two samples tested with the two sets as t gradually increase the number of elements in the sample until the number of elements increases to Np. Using formulas
And obtaining a curve of the t value changing along with the increase of the number of elements in the sample.
And 5: the obtained curve of the t-test value is compared with a safety threshold value SpCompare 4.5 if the curve is always below SpIf so, the side channel leakage of the product of the manufacturer reaches the safety requirement, otherwise, the side channel leakage does not reach the safety requirement.
Fig. 6 is a diagram of an example of energy waveform evaluation based on test vectors. The abscissa in the graph is the number of elements in the sample set and the ordinate is the t-test value, i.e. the test vector leakage value. The gray and black curves in the figure represent two encrypted products, respectively. It can be seen from the figure that the value of t exceeds the safety threshold S already when the number of elements of the grey line increases to more than 1000p(i.e., the dashed Safe TVLA value in the figure) and is therefore an encrypted product that does not meet the security requirements. When the number of elements of the black line is increased to 5000, the value t still does not exceed the safety threshold SpIt is therefore an encrypted product that meets the security requirements.
FIG. 7 is a detailed flow chart of the third stage "acquiring and evaluating electromagnetic waveforms" of the present invention, and the following describes in detail the steps of the third stage "acquiring and evaluating electromagnetic waveforms".
Step 1: the fixed plaintext is input, i.e. each time the input is encrypted 0xda39a3ee5e6b4b0d3255bfef95601890, and the N is acquired with an oscilloscopeeA strip electromagnetic waveform.
Step 2: inputting random plaintext, starting from input 0x00000000000000000000000000000000, the output of each encryption being the input of the next encryption, and acquiring N by using an oscilloscopeeA strip electromagnetic waveform.
And step 3: determining a time point of possible leakage on two groups of waveforms, and independently extracting data of the time point on all the waveforms to obtain two waveforms with NeA collection of individual elements.
And 4, step 4: starting from the element in the sample of 10, the two samples tested with the two sets as t gradually increase the number of elements in the sample until the number of elements increases to Ne. Using formulas
And obtaining a curve of the t value changing along with the increase of the number of elements in the sample.
And 5: the obtained curve of the t-test value is compared with a safety threshold value SeCompare 4.5 if the curve is always below SeIf so, the side channel leakage of the product of the manufacturer reaches the safety requirement, otherwise, the side channel leakage does not reach the safety requirement.
FIG. 8 is a diagram of an example of electromagnetic waveform evaluation based on test vectors. The abscissa in the graph is the number of elements in the sample set and the ordinate is the t-test value, i.e. the test vector leakage value. The gray and black curves in the figure represent two encrypted products, respectively. It can be seen from the figure that the gray line has exceeded the safety threshold S already when the number of elements increases above 1500e(i.e., the dashed Safe TVLA value in the figure) and is therefore an encrypted product that does not meet the security requirements. When the number of elements of the black line is increased to 5000, the value t still does not exceed the safety threshold SeIt is therefore an encrypted product that meets the security requirements.
Fig. 9 is a detailed flowchart of the fourth stage "collecting and evaluating encryption time data" of the present invention, and the following describes the steps of the fourth stage "collecting and evaluating encryption time data" in detail.
Step 1: input fixed plaintext, i.e. each time the encrypted input 0xda39a3ee5e6b4b0d3255bfef95601890, collect NtEncrypting the time data.
Step 2: inputting random plaintext, starting from input 0x00000000000000000000000000000000, the output of each encryption being the input of the next encryption, collecting NtEncrypting the time data.
And step 3: the two samples tested with these two sets as t, starting with 10 elements in the sample, gradually increase the number of elements in the sample,until increasing to Nt. Using the formula:
and obtaining a curve of the t value changing along with the increase of the number of elements in the sample.
And 4, step 4: the obtained curve of the t-test value is compared with a safety threshold value StCompare 12 if the curve is always below StIf so, the side channel leakage of the product of the manufacturer reaches the safety requirement, otherwise, the side channel leakage does not reach the safety requirement.
Fig. 10 is a diagram of an example of evaluation of encrypted time data based on test vectors. The abscissa in the graph is the number of elements in the sample set and the ordinate is the t-test value, i.e. the test vector leakage value. Curve 1, curve 2 and curve 3 in the figure represent three encrypted products respectively. It can be seen from the figure that when the number of elements of curve 1 is increased to 300, and when the number of elements of curve 2 is increased to 800, the value of t exceeds the safety threshold St(i.e., the dashed Safe TVLA value in the figure) and is therefore an encrypted product that does not meet the security requirements. When the number of elements of the curve 3 is increased to 10000, the value t still does not exceed the safety threshold StIt is therefore an encrypted product that meets the security requirements.
Finally, the t values of the three leakage evaluations and the result of whether the t values exceed the safety threshold are combined together to obtain a multi-dimensional side channel leakage evaluation result, as shown in table 2.
Table 2: evaluation result example
Type of leakage | TVLA evaluation value | Whether a safety threshold is exceeded |
Energy waveform | 3.8 | Whether or not |
Electromagnetic wave form | 3.9 | Whether or not |
Encrypting time data | 8.7 | Whether or not |
Another embodiment of the present invention provides a multi-dimensional side channel leakage evaluation system based on test vectors, which includes:
the data set determining module is used for determining the size of the data set of each evaluation category according to the expected security level of the tested password module or equipment;
the first dimension side channel leakage evaluation module is used for acquiring an energy waveform according to the size of the data set determined by the data set determination module and evaluating the energy side channel leakage;
the second dimension side channel leakage evaluation module is used for acquiring electromagnetic waveforms according to the size of the data set determined by the data set determination module and performing electromagnetic side channel leakage evaluation;
the third dimension side channel leakage evaluation module is used for acquiring encryption time data according to the size of the data set determined by the data set determination module and evaluating the leakage of the encryption time;
and the evaluation result output module is used for combining the evaluation results of the first dimension side channel leakage evaluation module, the second dimension side channel leakage evaluation module and the third dimension side channel leakage evaluation module to obtain and output a multi-dimension side channel leakage evaluation result.
The above embodiments are only intended to illustrate the technical solution of the present invention and not to limit the same, and a person skilled in the art can modify the technical solution of the present invention or substitute the same without departing from the spirit and scope of the present invention, and the scope of the present invention should be determined by the claims.
Claims (14)
1. A multi-dimensional side channel leakage assessment method based on test vectors is characterized by comprising the following steps:
(1) determining the size of the data set of each evaluation category according to the expected security level of the tested cryptographic module or equipment;
(2) acquiring an energy waveform according to the size of the data set determined in the step (1), and evaluating the leakage of an energy side channel;
(3) acquiring electromagnetic waveforms according to the size of the data set determined in the step (1), and performing electromagnetic side channel leakage evaluation;
(4) acquiring encryption time data according to the size of the data set determined in the step (1), and evaluating encryption time leakage;
(5) and (4) combining the evaluation results of the steps (2) to (4) to obtain a multi-dimensional side channel leakage evaluation result.
2. The method of claim 1, wherein the step (1) comprises:
1.1) determining the data set size of the waveform of the channel on the energy collecting side, namely N, according to the safety level expected by the tested cryptographic module or equipment manufacturerpA value of (d);
1.2) determining the size of the data set for acquiring the electromagnetic side channel waveform, namely N, according to the security level expected by the tested cryptographic module or equipment manufacturereA value of (d);
1.3) determining the size of the data set for collecting the encryption time, namely N, according to the security level expected by the tested cryptographic module or the equipment manufacturertThe value of (c).
3. The multi-dimensional side channel leakage assessment method based on test vectors according to claim 2, wherein in step 1.1), when the security level is one level, the data set size N isp5000 a; data set size N with a second level of securityp10000 ═ 10000; when the security level is three levels, the data set size Np20000. In the step 1.2), when the security level is one level, the size N of the data sete5000 a; data set size N with a second level of securitye10000 ═ 10000; when the security level is three levels, the data set size Ne20000. In the step 1.3), when the security level is one level, the size N of the data sett10000 ═ 10000; data set size N with a second level of securityt100000; when the security level is three levels, the data set size Nt=1000000。
4. The method of claim 1, wherein the step (2) comprises:
2.1) data set size N based on the determined acquired energy side channel waveformpAcquiring the waveform of an energy side channel;
2.2) using the collected energy side channel waveform data, carrying out evaluation based on test vector and comparing with a safety threshold SpAnd (6) comparing.
5. The method of claim 4, wherein in step 2.1), the step of collecting the energy-side channel waveform comprises the steps of:
2.1.1) Collection of NpThe strip fixes the energy side channel waveform of the plaintext input, the fixed plaintext is: 0xda39a3ee5e6b4b0d3255bfef 95601890;
2.1.2) Collection of NpThe energy side channel waveform of the random plaintext input is started from the input 0x0000000000000000000000000000, and the output of each encryption is the input of the next encryption.
6. The method for multi-dimensional side channel leakage assessment based on test vectors as claimed in claim 4, wherein in step 2.2), the energy side channel waveform collected is evaluated based on test vectors, and the method is operated according to the following steps:
2.2.1) starting from 10 aggregate elements, increasing the number of aggregate elements until increasing to NpCalculating curves of t test values of the two sets changing along with the increase of the number of elements;
2.2.2) and safety threshold SpAnd comparing to obtain a single evaluation result of the energy leakage.
7. The method of claim 1, wherein the step (3) comprises:
3.1) data set size N according to the determined collected electromagnetic side channel waveformeCollecting electromagnetic side channel waveforms;
3.2) using the collected electromagnetic side channel waveform data to perform evaluation based on a test vector and a safety threshold SeAnd (6) comparing.
8. The method for multi-dimensional side channel leakage assessment based on test vectors as claimed in claim 7, wherein in said step 3.1), the electromagnetic side channel waveform acquisition is performed according to the following steps:
3.1.1) Collection of NeThe strip fixes the electromagnetic side channel waveform of the plaintext input, and the fixed plaintext is: 0xda39a3ee5e6b4b0d3255bfef 95601890;
3.1.2) Collection of NeThe electromagnetic side channel waveform of the strip random plaintext input, the random plaintext is from input 0x0000000000000000000000000000, and the output of each encryption is the input of the next encryption.
9. The method for evaluating multi-dimensional side channel leakage based on test vector as claimed in claim 7, wherein in step 3.2), the evaluation based on test vector is performed on the collected electromagnetic side channel waveform, and the method is performed according to the following steps:
3.2.1) starting from 10 aggregation elements, increasing the number of aggregation elements continuously until increasing to NeCalculating curves of t test values of the two sets changing along with the increase of the number of elements;
3.2.2) and safety threshold SeAnd comparing to obtain a single evaluation result of the electromagnetic leakage.
10. The method for multi-dimensional side-channel leakage assessment based on test vectors as claimed in claim 1, wherein said (4) comprises:
4.1) data set size N according to the determined acquisition encryption timetCollecting encryption time data;
4.2) using the collected encryption time data, carrying out evaluation based on test vectors and comparing the evaluation with a safety threshold StMake a comparison。
11. The multi-dimensional side channel leakage assessment method based on test vectors according to claim 10, wherein in step 4.1), the collecting of the encryption time data is performed according to the following steps:
4.1.1) Collection of NtThe single encryption time data of each fixed plaintext is as follows: 0xda39a3ee5e6b4b0d3255bfef 95601890;
4.1.2) Collection of NtThe single encryption time data of random plaintext is from input 0x0000000000000000000000000000, and the output of each encryption is the input of the next encryption.
12. The method for evaluating multi-dimensional side channel leakage based on test vectors as claimed in claim 10, wherein in step 4.2), the evaluation based on test vectors is performed on the encrypted time data, and the method is performed according to the following steps:
4.2.1) starting from 10 aggregation elements, increasing the number of aggregation elements until increasing to NtCalculating curves of t test values of the two sets changing along with the increase of the number of elements;
4.2.2) and safety threshold StAnd comparing to obtain a single evaluation result of the time leakage.
13. The method of claim 12, wherein the safety threshold S is set astEqual to 12.
14. A multi-dimensional side channel leakage assessment system based on test vectors is characterized by comprising:
the data set determining module is used for determining the size of the data set of each evaluation category according to the expected security level of the tested password module or equipment;
the first dimension side channel leakage evaluation module is used for acquiring an energy waveform according to the size of the data set determined by the data set determination module and evaluating the energy side channel leakage;
the second dimension side channel leakage evaluation module is used for acquiring electromagnetic waveforms according to the size of the data set determined by the data set determination module and performing electromagnetic side channel leakage evaluation;
the third dimension side channel leakage evaluation module is used for acquiring encryption time data according to the size of the data set determined by the data set determination module and evaluating the leakage of the encryption time;
and the evaluation result output module is used for combining the evaluation results of the first dimension side channel leakage evaluation module, the second dimension side channel leakage evaluation module and the third dimension side channel leakage evaluation module to obtain and output a multi-dimension side channel leakage evaluation result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910035749.2A CN109921892A (en) | 2019-01-15 | 2019-01-15 | A kind of various dimensions side channel leakage appraisal procedure and system based on test vector |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910035749.2A CN109921892A (en) | 2019-01-15 | 2019-01-15 | A kind of various dimensions side channel leakage appraisal procedure and system based on test vector |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109921892A true CN109921892A (en) | 2019-06-21 |
Family
ID=66960412
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910035749.2A Pending CN109921892A (en) | 2019-01-15 | 2019-01-15 | A kind of various dimensions side channel leakage appraisal procedure and system based on test vector |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109921892A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110632499A (en) * | 2019-09-23 | 2019-12-31 | 珠海格力电器股份有限公司 | Test vector generation method based on test object and storage medium |
CN110932841A (en) * | 2019-11-27 | 2020-03-27 | 北京智慧云测信息技术有限公司 | System and method for searching optimal acquisition position of electromagnetic side information |
CN110943821A (en) * | 2019-11-27 | 2020-03-31 | 北京智慧云测信息技术有限公司 | Side information cross acquisition system and method for test vector leakage evaluation |
CN111970694A (en) * | 2020-08-27 | 2020-11-20 | 中国科学技术大学 | Method and equipment for realizing real-time side channel leakage evaluation on password equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100232603A1 (en) * | 2009-01-19 | 2010-09-16 | Fujitsu Limited | Decryption processor and decryption processing method |
US20150278554A1 (en) * | 2014-03-31 | 2015-10-01 | Stmicroelectronics S.R.L. | Encryption device of a substitution-box type, and corresponding encryption method and computer program product |
CN107104785A (en) * | 2016-02-22 | 2017-08-29 | 埃沙尔公司 | The method of the resistance of test circuit offside Multiple Channel Analysis |
-
2019
- 2019-01-15 CN CN201910035749.2A patent/CN109921892A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100232603A1 (en) * | 2009-01-19 | 2010-09-16 | Fujitsu Limited | Decryption processor and decryption processing method |
US20150278554A1 (en) * | 2014-03-31 | 2015-10-01 | Stmicroelectronics S.R.L. | Encryption device of a substitution-box type, and corresponding encryption method and computer program product |
CN107104785A (en) * | 2016-02-22 | 2017-08-29 | 埃沙尔公司 | The method of the resistance of test circuit offside Multiple Channel Analysis |
Non-Patent Citations (5)
Title |
---|
ARVIND SINGH: "《Improved Power/EM Side-Channel Attack Resistance of 128-Bit AES Engines With Random Fast Voltage Dithering》", 《IEEE JOURNAL OF SOLID-STATE CIRCUITS》 * |
JINGQUAN GE: "《Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable Soc》", 《23RD EUROPEAN SYMPOSIUM ON RESEARCH IN COMPUTER SECURITY》 * |
中国密码学会: "《密码学学报发展报告》", 1 April 2016 * |
国家密码管理局商用密码检测中心: "《安全芯片密码检测准则》", 30 November 2011 * |
姚剑波: "《层次化的侧信道攻击风险量化评估模型》", 《计算机工程与应用》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110632499A (en) * | 2019-09-23 | 2019-12-31 | 珠海格力电器股份有限公司 | Test vector generation method based on test object and storage medium |
CN110632499B (en) * | 2019-09-23 | 2021-04-23 | 珠海格力电器股份有限公司 | Test vector generation method based on test object and storage medium |
CN110932841A (en) * | 2019-11-27 | 2020-03-27 | 北京智慧云测信息技术有限公司 | System and method for searching optimal acquisition position of electromagnetic side information |
CN110943821A (en) * | 2019-11-27 | 2020-03-31 | 北京智慧云测信息技术有限公司 | Side information cross acquisition system and method for test vector leakage evaluation |
CN111970694A (en) * | 2020-08-27 | 2020-11-20 | 中国科学技术大学 | Method and equipment for realizing real-time side channel leakage evaluation on password equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109921892A (en) | A kind of various dimensions side channel leakage appraisal procedure and system based on test vector | |
CN106443379B (en) | The recognition methods of partial discharge of transformer fault type and device | |
CN111934852A (en) | AES password chip electromagnetic attack method and system based on neural network | |
CN106682515B (en) | The measure of capacity in malicious code analysis | |
CN106156615A (en) | Based on class separability sentence away from bypass circuit sectionalizer method and system | |
Hristov et al. | A model for identification of compromised devices as a result of cyberattack on IoT devices | |
Bohy et al. | Principal and independent component analysis for crypto-systems with hardware unmasked units | |
Cui et al. | Research on aes cryptographic chip electromagnetic attack based on deep transfer learning | |
Shadish et al. | A case study about why it can be difficult to test whether propensity score analysis works in field experiments | |
CN114372263A (en) | Anonymous data attack risk detection and evaluation method | |
Xiao | Properties of strong local nondeterminism and local times of stable random fields | |
Duong et al. | Highest density difference region estimation with application to flow cytometric data | |
CN109787741B (en) | Optimized intelligent card cipher algorithm template attack method | |
Arnout et al. | Differentially Private Time Series Generation. | |
Liu et al. | An Exact Generalized Test for Homogeneity of Inverse Gaussian Scale Parameters | |
Kim et al. | False Discovery Rate Controlling Procedures with BLOSUM62 substitution matrix and their application to HIV Data | |
Marinakis | Rating the Security Strength of Cryptographic Algorithms | |
Galstyan et al. | Is guilt by association a bad thing | |
CN115065509B (en) | Risk identification method and device for statistical inference attack based on deviation function | |
Ahrari et al. | Exponentiality Test Based on Progressively Type-II Censored Data Via Extension of Cumulative Tsallis Divergence | |
Han et al. | Large-scale multiple testing for matrix-valued data under double dependency | |
Zybin et al. | Analysis and optimization of decision-making in integrated security systems | |
Huang et al. | A direct approach for incomplete information systems | |
Thành et al. | Necessary and sufficient conditions for complete convergence of double weighted sums of pairwise independent identically distributed random elements in Banach spaces | |
Huang et al. | An Improved Pseudo-Random Number Generator Based on the Logistic Chaotic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190621 |