差分功耗分析(DPA)攻击被证明是一种非常有效的针对加密设备的攻击方法,但目前存在的几个版本的DPA攻击方法对差分信息的需求量过高,且抗干扰能力有限、稳定性不强。在研究DPA攻击的基础上对DPA攻击方法进行了重构,简化DPA攻击复杂度,并提出基于代数表达式功耗模型的DPA攻击方法,该方法能够提高攻击的准确性,降低DPA攻击对差分信息的需求量。在SASEBO—GII实验平台上的实验结果表明,在不增加时间复杂度的前提下,提出的方法能够将针对硬件执行高级加密标准算法(AES)的DPA攻击对差分信息的需求量从数千条降到数百条。甚至更低。
Differential Power Analysis (DPA) attack is the most efficient attack to encryption device. Some existing DPA methods have high demands for differential information and their stabilities are not strong. In this paper based on the analysis of DPA, the authors reconstructed the model of DPA, which reduced the complexity of attack. A new DPA attack combining new power model based on algebraic expression was proposed, and the experimental results show that the proposed DPA attack has the advantages of increasing the correctness of attacking without increasing the time complexity and reducing the number of the needed differential information from thousands to hundreds compared with the existing method.