信息安全研究 ›› 2019, Vol. 5 ›› Issue (1): 75-87.

• 密码应用安全专题 • 上一篇    下一篇

侧信道分析技术概览与实例

葛景全,屠晨阳,高能   

  1. 中国科学院数据与通信保护研究教育中心
  • 收稿日期:2019-01-08 出版日期:2019-01-15 发布日期:2019-01-08
  • 通讯作者: 葛景全
  • 作者简介:葛景全 博士研究生,主要研究方向为网络与空间安全. gejingquan@iie.ac.cn 中国科学院数据与通信保护研究教育中心 屠晨阳 博士,助理研究员,主要研究方向为网络与空间安全. tuchenyang@iie.ac.cn 高能 博士,研究员,主要研究方向为网络与空间安全. gaoneng@iie.ac.cn

Technology Overview of Side Channel Analysis

  • Received:2019-01-08 Online:2019-01-15 Published:2019-01-08

摘要: 随着越来越多不同种类的密码设备受到侧信道分析的物理安全威胁,侧信道分析技术逐步受到人们的关注和重视.依据所利用侧信息的差异,对现有经典侧信道分析技术进行分类介绍,并重点介绍能量电磁辐射分析和计时分析.近年来,由于现代CPU中cache的大量应用,针对cache的攻击越来越成为研究的热点.由于此类攻击需要采集时间数据,因此把cache攻击归为计时攻击的一类.最后,对近年来出现的一些重要的侧信道分析实例进行介绍,并对其攻击方法、实施难度等进行分析.

关键词: 侧信道分析, 密码设备, 能量分析, 电磁分析, 计时分析, 分析实例

Abstract: Along with more and more different kinds of cipher devices are suffered from the physical security threat of side channel analysis, the side channel analysis has been paid more attention. Based on the difference of the side channel information used, this paper classifies and introduces the side channel analysis technology, including the powerelectromagnetic(EM) analysis and timing analysis. In recent years, due to the widespread use of cache in modern CPUs, cache attacks have become a hot topic of side channel research. Since cache attacks require time data collection, we classify cache attacks as a type of timing analysis attack. At last, we introduce some important examples of side channel analysis in recent years, and analyze the attacking methods and degree of implementation difficulties.

Key words: side channel analysis, cipher device, power analysis, electromagnetic analysis, timing analysis, analysis example