期刊文献+
共找到598篇文章
< 1 2 30 >
每页显示 20 50 100
An Improved Simple Power Attack against Camellia's Key Schedule
1
作者 LIU Shuanggen NI Haiying +1 位作者 HU Yupu LIAO Yunyan 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期591-594,共4页
This paper presents an improved simple power attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power meas... This paper presents an improved simple power attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power measurements, in this paper, two types of the simple power attack are presented and shown to be tolerant of errors that might occur in the Hamming weight determinations. In practical applications of the attack, such errors are likely to occur due to noise and distortion in the power measurements and their mapping to the Hamming weights of the data. To resist these attacks, the required design rationale of key schedules and several practical countermeasures are suggested. 展开更多
关键词 simple power attack CAMELLIA key schedule Hamming weight attack
在线阅读 下载PDF
Erratum to: An Improved Simple Power Attack against Camellia's Key Schedule
2
作者 Wuhan University Journal of Natural Sciences 《Wuhan University Journal of Natural Sciences》 CAS 2009年第6期552-552,共1页
Retraction: LIU Shuanggen, NI Haiying, HU Yupu, LIAO Yunyan. An Improved Simple Power Attack against Camellia's Key Schedule. Wuhan University Journal of Natural Sciences, 2008, 13(5): 591-594. DOI: 10.1007/s 11... Retraction: LIU Shuanggen, NI Haiying, HU Yupu, LIAO Yunyan. An Improved Simple Power Attack against Camellia's Key Schedule. Wuhan University Journal of Natural Sciences, 2008, 13(5): 591-594. DOI: 10.1007/s 11859-008-0516-3 展开更多
关键词 DOI An Improved Simple power attack against Camellia’s Key Schedule Erratum to
原文传递
Clustering Collision Power Attack on RSA-CRT 被引量:1
3
作者 Wunan Wan Jun Chen +3 位作者 Jinyue Xia Jinquan Zhang Shibin Zhang Hao Chen 《Computer Systems Science & Engineering》 SCIE EI 2021年第2期417-434,共18页
In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introd... In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introduced via chosen-message pairs.This attack method is that the key parameters dp and dq are segmented by byte,and the modular multiplication collisions are identified by k-means clustering.The exponents dp and dq were recovered by 12 power traces of six groups of the specific message pairs,and the exponent d was obtained.We also propose a second order clustering collision power analysis attack against RSA implementation with CRT,which applies double blinding exponentiation.To reduce noise and artificial participation,we analyze the power points of interest by preprocessing and k-means clustering with horizontal correlation collisions.Thus,we recovered approximately 91%of the secret exponents manipulated with a single power curve on RSA-CRT with countermeasures of double blinding methods. 展开更多
关键词 Collision attack power analysis attack chosen-message attack module exponentiation RSA-CRT
在线阅读 下载PDF
Side-Channel Attacks & Data Exfiltration Using Wall Outlet USB Power Adapters
4
作者 Andrew Masters Vijay K. Madisetti 《Journal of Information Security》 2024年第4期433-447,共15页
The number and creativity of side channel attacks have increased dramatically in recent years. Of particular interest are attacks leveraging power line communication to 1) gather information on power consumption from ... The number and creativity of side channel attacks have increased dramatically in recent years. Of particular interest are attacks leveraging power line communication to 1) gather information on power consumption from the victim and 2) exfiltrate data from compromised machines. Attack strategies of this nature on the greater power grid and building infrastructure levels have been shown to be a serious threat. This project further explores this concept of a novel attack vector by creating a new type of penetration testing tool: an USB power adapter capable of remote monitoring of device power consumption and communicating through powerline communications. 展开更多
关键词 CYBERSECURITY Side Channel attack power Line Communication Penetration Testing Hotplug attack Tool
在线阅读 下载PDF
Correlation power attack on a message authentication code based on SM3
5
作者 Ye YUAN Kai-ge QU +2 位作者 Li-jiWU Jia-weiMA Xiang-min ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期930-946,共17页
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec... Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure. 展开更多
关键词 HMAC-SM3 Side channel analysis Correlation power attack Bit-wise chosen-plaintext
原文传递
Research on High Power Inter-Channel Crosstalk Attack in Optical Networks 被引量:1
6
作者 张引发 任帅 +3 位作者 李娟 廖晓闽 李明 方园园 《Journal of Shanghai Jiaotong university(Science)》 EI 2015年第1期7-13,共7页
While all-optical networks become more and more popular as the basis of the next generation Internet(NGI)infrastructure,such networks raise many critical security issues.High power inter-channel crosstalk attack is on... While all-optical networks become more and more popular as the basis of the next generation Internet(NGI)infrastructure,such networks raise many critical security issues.High power inter-channel crosstalk attack is one of the security issues which have negative effect on information security in optical networks.Optical fiber in optical networks has some nonlinear characteristics,such as self phase modulation(SPM),cross phase modulation(XPM),four-wave mixing(FWM)and stimulated Raman scattering(SRS).They can be used to implement high power inter-channel crosstalk attack by malicious attackers.The mechanism of high power inter-channel crosstalk attack is analyzed.When an attack occurs,attack signal power and fiber nonlinear refractive index are the main factors which affect quality of legitimate signals.The effect of high power inter-channel crosstalk attack on quality of legitimate signals is investigated by building simulation system in VPI software.The results show that interchannel crosstalk caused by high power attack signal leads to quality deterioration of legitimate signals propagated in the same fiber.The higher the power of attack signal is,the greater the fiber nonlinear refractive index is.The closer the channel spacing away from the attack signal is,the more seriously the legitimate signals are affected by attack.We also find that when attack position and power of attack signal are constant,attack signal cannot infinitely spread,while its attack ability shows a fading trend with the extension of propagation distance. 展开更多
关键词 security of optical networks inter-channel crosstalk attack power of attack signal nonlinear characteristics of optical fiber
原文传递
Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks
7
作者 Nadia Mustaqim Ansari Rashid Hussain +1 位作者 Sheeraz Arif Syed Sajjad Hussain 《Computers, Materials & Continua》 SCIE EI 2022年第7期1861-1875,共15页
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the informat... The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the information by observing the power consumption,electromagnetic(EM)field,timing analysis,and acoustics of the device.Later,the attackers perform statistical functions to recover the key.Advanced Encryption Standard(AES)algorithm has proved to be a good security solution for constrained IoT devices.This paper implements a simulation model which is used to modify theAES algorithm using logicalmasking properties.This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES.This model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB simulator.Results will give better solution by hiding power profiles of the IoT devices against PAAs.In future,the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic(WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array(FPGA). 展开更多
关键词 Side channel attacks power analysis attacks network security MASKING advance encryption standard
在线阅读 下载PDF
An Improved Empirical Mode Decomposition for Power Analysis Attack
8
作者 Han Gan Hongxin Zhang +3 位作者 Muhammad Saad khan Xueli Wang Fan Zhang Pengfei He 《China Communications》 SCIE CSCD 2017年第9期94-99,共6页
Correlation power analysis(CPA) has become a successful attack method about crypto-graphic hardware to recover the secret keys. However, the noise influence caused by the random process interrupts(RPIs) becomes an imp... Correlation power analysis(CPA) has become a successful attack method about crypto-graphic hardware to recover the secret keys. However, the noise influence caused by the random process interrupts(RPIs) becomes an important factor of the power analysis attack efficiency, which will cost more traces or attack time. To address the issue, an improved method about empirical mode decomposition(EMD) was proposed. Instead of restructuring the decomposed signals of intrinsic mode functions(IMFs), we extract a certain intrinsic mode function(IMF) as new feature signal for CPA attack. Meantime, a new attack assessment is proposed to compare the attack effectiveness of different methods. The experiment shows that our method has more excellent performance on CPA than others. The first and the second IMF can be chosen as two optimal feature signals in CPA. In the new method, the signals of the first IMF increase peak visibility by 64% than those of the tradition EMD method in the situation of non-noise. On the condition of different noise interference, the orders of attack efficiencies are also same. With external noise interference, the attack effect of the first IMF based on noise with 15dB is the best. 展开更多
关键词 power ANALYSIS attack EMD IMF CORRELATION power analysis RPIs
在线阅读 下载PDF
Analysis of Causes and Actual Events on Electric Power Infrastructure Impacted by Cyber Attack
9
作者 Hongxu Yin Rui Xiao Fenfei Lv 《Journal of Power and Energy Engineering》 2015年第4期77-84,共8页
With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both ... With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both domestic and foreign attention. First, main reasons of the impact on power infrastructure caused by cyber attack are analyzed from the following two aspects: 1) The dependence of electric power infrastructure on information infrastructure makes cyber attack issues in information field likely to affect electric power field. 2) As regards to the potential threat sources, it will be considerably profitable to launch cyber attacks on electric power infrastructure. On this basis, this paper gives a classified elaboration on the characteristics and the possibilities of cyber attacks on electrical infrastructures. Finally, the recently published actual events of cyber attacks in respect of threat sources, vulnerabilities and assaulting modes are analyzed and summarized. 展开更多
关键词 CYBER attack Electric power INFRASTRUCTURE Information INFRASTRUCTURE DEPENDENCE
在线阅读 下载PDF
Secure and efficient elliptic curve cryptography resists side-channel attacks 被引量:8
10
作者 Zhang Tao Fan Mingyu Zheng Xiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期660-665,共6页
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 展开更多
关键词 elliptic curve cryptography side channel attack simple power attack differential power attack refined power analysis zero-point power analysis.
在线阅读 下载PDF
针对物联网设备的旁路攻击及防御方法的研究 被引量:4
11
作者 何乐生 冯毅 +2 位作者 岳远康 杨崇宇 胡崇辉 《通信学报》 北大核心 2025年第2期166-175,共10页
物联网设备通常使用计算能力受限的微控制器来实现,因而只能采用轻量级对称加密算法来保证其数据安全,且其自身的特点决定了只能被部署在开放环境中,极易遭受旁路攻击。针对这一问题,在基于自主设计的旁路攻击验证平台上开展实验,并提... 物联网设备通常使用计算能力受限的微控制器来实现,因而只能采用轻量级对称加密算法来保证其数据安全,且其自身的特点决定了只能被部署在开放环境中,极易遭受旁路攻击。针对这一问题,在基于自主设计的旁路攻击验证平台上开展实验,并提出了安全密钥管理方案及改进的S盒设计,作为旁路攻击防御方法。验证平台由两级差分放大器和抗干扰有限冲激响应(FIR)滤波器构成,能够捕捉微弱的功耗变化,并设计了针对轻量级加密算法的两轮相关能量攻击。通过获取正确密钥相关系数置信度的评估方法,在对PRESENT算法的3 000条功耗曲线进行10 000次攻击后,成功率超过96%,正确密钥的相关性均值均超过0.6,在95%的置信水平下,拥有狭窄的置信区间,而采用改进后的算法进行相同实验时,攻击成功率仅为9.12%。 展开更多
关键词 物联网安全 轻量级密码 旁路攻击 相关能量分析
在线阅读 下载PDF
基于DyCML的改进型三阶段抗功耗攻击型D触发器
12
作者 姚茂群 李聪辉 +1 位作者 李海威 陈冉 《浙江大学学报(理学版)》 北大核心 2025年第4期424-430,共7页
功耗攻击是一种通过统计电路的功耗信息得到敏感数据信息的攻击手段。作为电路的重要组成单元,触发器的抗功耗攻击水平与电路的安全性能息息相关,为此提出一种抗功耗攻击型触发器。通过引入“预充电-求值-放电”三阶段逻辑,提出了改进... 功耗攻击是一种通过统计电路的功耗信息得到敏感数据信息的攻击手段。作为电路的重要组成单元,触发器的抗功耗攻击水平与电路的安全性能息息相关,为此提出一种抗功耗攻击型触发器。通过引入“预充电-求值-放电”三阶段逻辑,提出了改进型的三阶段动态电流模式逻辑D触发器(improved three-phase dynamic current mode logic-based D flip-flop,TDyCML_FF),避免了因负载电容不均衡引起的电路功耗不恒定等安全问题。同时对三阶段逻辑结构进行了改进,由电路内部节点信号生成放电信号,从而避免通过减缓时钟频率或消除放电信号对其进行攻击,提高了电路的抗功耗攻击性能。通过Hspice仿真实验,并引入归一化能量偏差(NED)和归一化标准偏差(NSD)2个量化参数,将TDyCML_FF感应放大逻辑触发器(SABL_FF)、三阶段双轨预充电逻辑触发器(TDPL_FF)等抗功耗攻击型触发器进行了对比,证明TDyCML_FF具有较高的抗功耗攻击性能。 展开更多
关键词 三阶段逻辑 侧信道攻击 功耗攻击 触发器设计
在线阅读 下载PDF
基于攻击图的电力网络安全风险度量方法
13
作者 向勇 张硕 常星 《计算机工程与设计》 北大核心 2025年第1期88-96,共9页
为在不影响不影响生产前提下对电力网络安全进行定量评估,研究一种基于模板构建电力网络分区式攻击图模型的方法。预定义网络拓扑模板和漏洞模板,将电力网络攻击图分区构建。在此基础上,提出一种定量分析方法和最大可能攻击路径预测方... 为在不影响不影响生产前提下对电力网络安全进行定量评估,研究一种基于模板构建电力网络分区式攻击图模型的方法。预定义网络拓扑模板和漏洞模板,将电力网络攻击图分区构建。在此基础上,提出一种定量分析方法和最大可能攻击路径预测方法。根据设备的重要性、分区的安全等级、设备在网络中的影响以及操作系统版本,计算设备节点的威胁级别。通过考虑跨域次数和攻击路径长度,确定最大可能攻击路径。实验验证了方法的有效性和全面性。 展开更多
关键词 网络安全 电力系统 攻击图 安全度量 最大可能攻击路径 安全分区 漏洞评分
在线阅读 下载PDF
基于CBAM-CNN的CPS负荷重分配攻击检测定位方法设计
14
作者 陆玲霞 马朝祥 +1 位作者 闫旻睿 于淼 《实验技术与管理》 北大核心 2025年第6期78-89,共12页
负荷重分配攻击是一种特殊的虚假信息注入攻击。对于电力信息物理系统,基于模型的方法难以检测定位多类型负荷重分配攻击,且针对多类型负荷重分配攻击的数据驱动检测定位方法研究较少。为此,设计了一种以双层规划模型为基础的,基于带卷... 负荷重分配攻击是一种特殊的虚假信息注入攻击。对于电力信息物理系统,基于模型的方法难以检测定位多类型负荷重分配攻击,且针对多类型负荷重分配攻击的数据驱动检测定位方法研究较少。为此,设计了一种以双层规划模型为基础的,基于带卷积注意力模块神经网络的负荷重分配攻击定位检测方法。首先对电力信息物理系统中的信息系统进行建模,总结得到三种信息侧负荷重分配攻击行为。随后建立考虑攻击者和调度中心管理者博弈关系的双层规划模型,针对不同攻击场景生成负荷重分配攻击数据集。为了检测定位不同类型的攻击,将所研究问题转化为多标签分类问题,利用卷积神经网络的卷积结构特性挖掘并学习具有稀疏标签数据的邻域信息,引入卷积注意力模块,从通道信息和空间信息两个角度增强网络对于重点信息的学习能力,改善了网络漏判率较高的问题,提高了网络检测定位性能。在38节点电力信息物理系统算例上进行仿真实验,验证了所提方法的有效性。与对比方法相比,所提方法对于三种攻击类型都有较低的误判率和漏判率,检测定位性能更加出色。 展开更多
关键词 电力信息物理系统 负荷重分配攻击 双层规划模型 数据驱动 卷积注意力模块 卷积神经网络
在线阅读 下载PDF
带扰流板结构的海上风电单桩基础受来流攻角的影响研究 被引量:1
15
作者 李会 邱旭 +2 位作者 闫姝 赵昊 马文冠 《太阳能学报》 北大核心 2025年第3期635-642,共8页
针对扰流板型海上风电单桩基础冲刷防护结构,在已开展的扰流板尺寸及数量对冲刷防护效果影响的研究基础上,进一步探究来流攻角对冲刷防护效果的影响。在实际工程中,海流的流动方向是不确定的。为此,基于数值模拟的研究手段,通过改变扰... 针对扰流板型海上风电单桩基础冲刷防护结构,在已开展的扰流板尺寸及数量对冲刷防护效果影响的研究基础上,进一步探究来流攻角对冲刷防护效果的影响。在实际工程中,海流的流动方向是不确定的。为此,基于数值模拟的研究手段,通过改变扰流板的安装角来模拟不同来流攻角,以0°和22.5°攻角下扰流肋数量为8的扰流板和0°和30°攻角下扰流肋数量为6的扰流板结构为研究对象,对其冲刷防护特性进行研究。分析扰流板结构在不同来流下马蹄涡强度和位置的变化特征,以及床面剪切应力的分布和相对保护面积的变化规律。研究发现,冲刷防护效果基本随着来流攻角的增加而减弱,且随扰流板长度或高度的增加,其角度变化带来的保护面积的差异也逐渐增加。总的来说,来流攻角为0°具有较好的冲刷防护效果。 展开更多
关键词 海上风电 攻角 圆柱绕流 扰流板 马蹄涡 剪切应力
原文传递
基于自适应差分进化-模糊宽度学习系统的FDIA定位检测方法
16
作者 席磊 陈洪军 +2 位作者 彭典名 王文卓 白芳岩 《中国电机工程学报》 北大核心 2025年第19期7468-7480,I0017,共14页
作为能源互联网的关键组成部分,电力信息物理系统面临着虚假数据注入攻击的威胁。针对此类攻击的检测技术往往忽视攻击注入位置的定位检测,而试图解决这一问题的研究难以在检测精度和计算时间上取得平衡。因此,该文提出一种基于自适应... 作为能源互联网的关键组成部分,电力信息物理系统面临着虚假数据注入攻击的威胁。针对此类攻击的检测技术往往忽视攻击注入位置的定位检测,而试图解决这一问题的研究难以在检测精度和计算时间上取得平衡。因此,该文提出一种基于自适应差分进化-模糊宽度学习系统的定位检测方法。所提算法采用具有横向网络结构的模糊宽度学习系统构成定位检测算法,实现定位检测的快速响应。同时,提出一种自适应差分进化算法对量测数据进行特征选择,剔除其中的冗余特征,有效地提升算法的定位检测精确性。在IEEE-14和57节点系统中进行大量仿真,验证所提方法能够对虚假数据注入攻击进行精确定位,且与多种传统检测算法相比,具有更佳的准确率、精度、召回率和F1-Score。 展开更多
关键词 能源互联网 电力信息物理系统 虚假数据注入攻击 模糊宽度学习系统 差分进化
原文传递
基于改进卷积神经网络的电网虚假数据注入攻击定位方法 被引量:2
17
作者 席磊 程琛 田习龙 《南方电网技术》 北大核心 2025年第1期74-84,共11页
虚假数据注入攻击通过篡改数据采集与监视控制系统采集的数据,进而破坏电力系统的稳定运行。传统虚假数据注入攻击检测方法无法对受攻击位置进行定位,亦或定位精度低。首先提出一种改进海鸥优化卷积神经网络的虚假数据注入攻击检测方法... 虚假数据注入攻击通过篡改数据采集与监视控制系统采集的数据,进而破坏电力系统的稳定运行。传统虚假数据注入攻击检测方法无法对受攻击位置进行定位,亦或定位精度低。首先提出一种改进海鸥优化卷积神经网络的虚假数据注入攻击检测方法,所提方法利用具有共享权值和局部连接特性的卷积神经网络来对高维历史量测数据进行高效的特征提取及分类。然后引入具备平衡全局搜索和局部搜索能力的改进海鸥优化算法进行超参数寻优,以获得虚假数据检测的高度匹配网络结构,进而对不良数据进行检测和定位。最后通过对IEEE-14和IEEE-57节点系统进行大量攻击检测实验,验证了所提方法的有效性,并与其他多种检测方法对比,验证了所提方法的具有更优的分类性能、更高的准确率、精度、召回率和F1值。 展开更多
关键词 虚假数据注入攻击 电力系统 卷积神经网络 海鸥优化 数据检测
在线阅读 下载PDF
最新电压毛刺(Power Glitch)攻击与防御方法研究 被引量:5
18
作者 段晓毅 李莉 +1 位作者 武玉华 靳济芳 《计算机科学》 CSCD 北大核心 2011年第B10期428-431,共4页
电压毛刺(Power Glitch)攻击是通过快速改变输入到芯片的电压,使得芯片里的某些晶体管受到影响,引起一个或多个触发器进入错误状态,从而导致处理器会跳过或实施错误的操作,使芯片内隐藏的信息随着产生的错误而泄露出来。对电压毛刺攻击... 电压毛刺(Power Glitch)攻击是通过快速改变输入到芯片的电压,使得芯片里的某些晶体管受到影响,引起一个或多个触发器进入错误状态,从而导致处理器会跳过或实施错误的操作,使芯片内隐藏的信息随着产生的错误而泄露出来。对电压毛刺攻击与防御技术的最新进展情况进行了综述。在攻击方面,针对攻击目的的不同,详细介绍了RSA-CRT签名运算、RSA非CRT签名运算、对非易失存储器的攻击技术。防御技术分别介绍了电压毛刺检测电路和掩码,并分析了各种防御方案的优缺点。 展开更多
关键词 电压毛刺攻击 智能卡 硬件安全 RSA攻击 存储器攻击
在线阅读 下载PDF
针对SM4的选择明文攻击:线性运算带来的难题与对策
19
作者 唐啸霖 冯燕 +2 位作者 李志强 郭叶 龚关飞 《电子与信息学报》 北大核心 2025年第8期2791-2799,共9页
在硬件安全领域,各种侧信道攻击已受到广泛关注,这类攻击利用硬件泄漏的物理信息来推断密钥等敏感信息,其中能量分析攻击是最受关注的侧信道攻击技术之一。针对高级加密标准的能量分析攻击方法相对成熟,对于SM4算法,由于其轮运算包含特... 在硬件安全领域,各种侧信道攻击已受到广泛关注,这类攻击利用硬件泄漏的物理信息来推断密钥等敏感信息,其中能量分析攻击是最受关注的侧信道攻击技术之一。针对高级加密标准的能量分析攻击方法相对成熟,对于SM4算法,由于其轮运算包含特殊的线性变换模块,使得能量分析攻击更加困难。针对SM4的选择明文攻击方法可以规避线性变换模块带来的运算复杂度,但这些方法面临以下难题:如何构造四轮选择明文、如何恢复初始密钥、如何分辨对称攻击结果,以及如何排除高相关性错误猜测值。该文在深入分析难题产生原因的基础上,提出了相应的对策,并对SM4算法实现进行了能量分析攻击实验,结果表明:所提应对策略,能有效解决在SM4的选择明文攻击过程中,线性运算带来的难题。 展开更多
关键词 SM4算法 能量分析攻击 选择明文 线性运算
在线阅读 下载PDF
核电厂时钟系统的网络安全研究
20
作者 李江海 龙振海 李博远 《自动化仪表》 2025年第9期86-90,共5页
时钟系统面临的网络安全威胁,不仅影响时钟系统自身,还可能波及与其连接的其他需授时系统,因此该系统是全厂网络风险中的关键节点。结合标准和案例,综述核电厂时钟系统网络安全的实践和研究现状。在时钟系统工作流程和系统架构梳理的基... 时钟系统面临的网络安全威胁,不仅影响时钟系统自身,还可能波及与其连接的其他需授时系统,因此该系统是全厂网络风险中的关键节点。结合标准和案例,综述核电厂时钟系统网络安全的实践和研究现状。在时钟系统工作流程和系统架构梳理的基础上,从网络安全防护目标出发,分析列举时钟系统遭受攻击后的可能后果。假想若干典型的攻击方式作为防护的基准,并通过搭建测试平台进行模拟验证。根据试验结果和现有标准,提出网络安全防护建议。研究结果表明,至少有三类可行的入侵时钟系统并波及其他核电厂系统的网络攻击方式,因此应加强对时钟系统的网络安全防护。该研究可提升时钟系统在未来核电智能化发展中的可靠性和安全性。 展开更多
关键词 核电厂 时钟系统 网络安全 时间同步攻击 安全监测
在线阅读 下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部