期刊文献+

基于碰撞模型的PRESENT密码代数旁路攻击 被引量:2

Collision model based algebraic side-channel attack on PRESENT
在线阅读 下载PDF
导出
摘要 提出了一种新的分组密码通用的基于碰撞模型的分组密码代数旁路分析方法—代数功耗碰撞攻击,将代数攻击与功耗碰撞攻击结合,首先利用代数分析方法建立密码算法等效布尔代数方程组;然后通过功耗攻击手段获取密码加密过程运行时泄露的功耗信息,经分析转化为加密过程碰撞信息,并表示为关于加密中间状态变元的代数方程组;最后使用CryptoMiniSAT解析器求解方程组恢复密钥。应用该方法对在8位微控制器上实现的PRESENT密码进行了实际攻击,实验结果表明,代数攻击基础上引入额外的代数方程组,可有效降低方程组求解的复杂度;PRESENT易遭受此类代数功耗攻击的威胁,明密文已知,以4个样本全轮碰撞或8个样本部分轮碰撞信息成功获取PRESENT 80bit完整密钥。此外,文中分析方法也可为其它分组密码功耗碰撞分析提供一定思路。 A new generic collision model based algebraic side-channel analysis method on block ciphe;Algebraic Power collision Attack is proposed. This attack combines conventional algebraic eryptanalysis with power attack, firstly equivalent Boolean algebraic equations of cipher encryption is built by algebraic cryptanalysis method. Secondly power information is gotten, which leak out from running cipher chips by side-channel attack technique, and transform into collision information that is expressed to algebraic equations about encryption middle state variable; finally by CryptoMiniSAT. To solve the quations and recover key is solved. The attack is to a PRESENT implementation on an 8-bit mierocontroller with this method, experiments demonstrate that: algebraic power attack can introduce new algebraic equations into conventional algebraic attack, reduce the complexity of solving equations; PRESENT may suffer from threat of this algebraic power attack easily, when plaintexts and eiphertexts are known, only 4 samples of full round collision or 8 sampless of part-round collision can recover 80 bit master key of PRESENT. Meanwhile, the analysis method proposed is applied into the power collision attack of other block ciphers.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第8期2936-2942,2994,共8页 Computer Engineering and Design
基金 国家自然科学基金项目(61173191 60772082)
关键词 代数功耗碰撞攻击 代数攻击 功耗攻击 PRESENT算法 CryptoMiniSAT解析器 algebraic power collision attack algebraic attack power attack PRESENT CryptoMiniSAT
  • 相关文献

参考文献16

  • 1Andreas Wiemers. Collision attacks for Comp128 on smartcards [C]. ECC-Brainpool Workshop on Side-Channel Attacks on Cryptographic Algorithms. Germany: Bonn, 2001: 75-92.
  • 2Herv'e Ledig, Fr'ed'eric Muller, and Fr'ed'eric Valette. Enhancing Collision Attacks [G]. LNCS 3156: CHES, 2004: 176-190.
  • 3Alex Biryukov, Dmitry Khovratovich. Two New Techniques of Side-Channel Cryptanalysis [G]. LNCS 4727: CHES, 2007:195-208.
  • 4Bogdanov, A. Improved side-channel collision attacks on AES [G]. LNCS 4876: SAC, 2007: 84-95.
  • 5Andrey Bogdanov, Andrey Pyshkin. Algebraic side-channel collision attacks on AES [EB/OL]. http: // eprint, iacr. org / 2007,2007.
  • 6Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: An ultra-lightweight block cipher [G]. LNCS 4727: CHES, 2007: 450-466.
  • 7吴克辉,王韬,赵新杰,刘会英.基于汉明重的PRESENT密码代数旁路攻击[J].计算机科学,2011,38(12):53-56. 被引量:6
  • 8Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power analysis attacks [M]. America: Springer, 2007.
  • 9Gregory V Bard, Nicolas T Courtois, Chris Jefferson. Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over GF (2) via SAT-solvers [EB/OL]. http://eprint, iacr. org /2007 /024/,2007.
  • 10MiniSat 2. 0. An open-source SAT solver package by Niklas E_ en Niklas S orensson [EB/OL]. http: // www. cs. chalmers. se/Cs/Research/FormalMethods/MiniSat/,2007.

二级参考文献17

  • 1Garey M, Jollllson D. Computers and Interactability a guide to the theory of NP-completenss. Freemall: 251-260.
  • 2Bogdanov A. Improved Side-channel Collision Attacks onAES [A]//SAC2007 [C]. LNC S 4876, Ottawa Canada, August 2007 : 84 -95.
  • 3Bogdanov A, Kizhvatov I, Pyshkin A. Algebraic Methods in Side-channel Collision Attacks and Practical Collision Detection [A]//Indocrypt 2008 [C]. LNCS 5365, Kharagpur, India, De cember 2008,251-265.
  • 4Oren Y, Kirschbaum M. Algebraic Side-channel Analysis in the Presence of Errors [A]//CHES 2010 [C]. LNCS 6225,2010: 428-442.
  • 5Bogdanov A,Knudsen L R, Leander, et al. PRESENT: anultra lightweight block cipher[A]//CHES 2007[C]. Vienna, Austria, 2007:450-466.
  • 6Courtois N, Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equmions [A]//Asiacrypt 2002 [C]. LNCS 2501,2002 : 267-287.
  • 7Courtois N T, Klimov A, Patarin J. Efficient Algorithms for Sol ving Overdefind Systems of Multivariate Polynomial Equattion [EB/EL]. 2000.
  • 8Faugere J C. A New Efficient Algorithm for Computing Grobner Basic(F4) [EB/OL]. http://www, spaces, lip6. fr//@ paper/ F99a. pdf, 1990.
  • 9Biryukov A, De Canniere C, Ciphers B. Systems of Quadratic E quations[A]//FSE 2003[C]. LNCS 2887,2003 : 274-289.
  • 10Kipnis A, Shamir A. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization[A]//Cryto99 [C]. 1999:19 -30.

共引文献5

同被引文献15

  • 1Aiguer M,Oswald E.Power analysis tutorial[C].Institute for Applied Information Processing and Communication,University of Technology Graz-Seminar,Tech.Rep.2000.
  • 2Kocher P,Jaffe J,Jun B.Differential power analysis[C].Advances in Cryptology—CRYPTO'99.SpringerBerlin Heidelberg,1999:388-397.
  • 3Van Eck W.Electromagnetic radiation from video display units:an eavesdropping risk[J].Computers & Security,1985,4(4):269-286.
  • 4Bar-El H,Choukri H,Naccache D,et al.The sorcerer's apprentice guide to fault attacks[J].Proceedings of the IEEE,2006,94(2):370-382.
  • 5Mangard S.A simple power-analysis (SPA) attack on implementations of the AES key expansion[M].Irformarion Security and Cryptology—ICISC 2002.SpringerBerlin Heidelberg,2003:343-358.
  • 6Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[M].Cryptographic Hardware and Embedded Systems-CHES 2004.Springer Berlin Heidelberg,2004:16-29.
  • 7Bogdanov A,Knudsen L R,Leander G,et al.PRESENT:An ultra-lightweight block cipher[M].Cryptographic Hardware and Embedded Systems-CHES 2007.Springer Berlin Heidelberg,2007:450-466.
  • 8Mangard S,Oswald E,Popp T.Power analysis attacks:Revealing the secrets of smart cards[M].Springer Publishing Company,Incorporated,2010.
  • 9卜凡,金晨辉.针对低轮PRESENT的代数攻击[J].计算机工程,2010,36(6):128-130. 被引量:7
  • 10吴克辉,王韬,赵新杰,刘会英.基于汉明重的PRESENT密码代数旁路攻击[J].计算机科学,2011,38(12):53-56. 被引量:6

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部