期刊文献+

MICKEY和Trivium同步流密码的能量攻击 被引量:1

Power attack of synchronous stream cipher MICKEY and Trivium
在线阅读 下载PDF
导出
摘要 为了提高同步流密码能量分析(PA)攻击的针对性和有效性,提出了面向同步流密码的PA攻击点选取策略。分析了同步流密码与分组密码在能量成分上的差异性,提出了同步流密码PA攻击点选取条件;根据同步流密码的结构特点,给出了不同攻击情形下的攻击点选取策略;针对eSTREAM项目中面向硬件实现的同步流密码算法MICKEY和Trivium给出了具体的攻击方案,利用PrimeTimePX等EDA工具获取密码算法的仿真功耗,进行了攻击实验。实验结果表明,上述攻击均能成功恢复出密钥信息,表明了攻击点选取策略的合理性。 To improve the relevance and effectiveness of power analysis (PA) attack on synchronous stream ciphers, a selection strategy of attack point for PA attack is proposed. Firstly, the differences of the energy component between synchronous stream ciphers and block ciphers are analyzed, and PA attack points selection criteria of synchronous stream cipher is proposed. Then, an selection strategy of PA attack for different attack scenarios is proposed according to the structural characteristics of synchro- nous stream ciphers. Finally, two specific attack schemes for MICKEY and Trivium, two hardware-oriented synchronous stream cipher algorithms in eSTREAM project, are given respectively. Simulation attack experiments are conducted by using EDA tools, e.g. PrimeTimePX et al, to obtain the simulation power consumption of the cryptographic algorithms. The results show that the above-mentioned attacks can successfully recover the key information and indicate that the selection strategy of attack point is reasonable.
出处 《计算机工程与设计》 CSCD 北大核心 2014年第3期809-813,913,共6页 Computer Engineering and Design
关键词 同步流密码 能量分析攻击 MICKEY算法 Trivium算法 仿真 synchronous stream cipher power analysis attack MICKEY algorithm Trivium algorithm simulation
  • 相关文献

参考文献4

二级参考文献27

  • 1马建庆,钟亦平,张世永.无线传感器网络密钥管理研究综述[J].仪器仪表学报,2006,27(z1):370-372. 被引量:1
  • 2代航阳,徐红兵.无线传感器网络(WSN)安全综述[J].计算机应用研究,2006,23(7):12-17. 被引量:7
  • 3ZHOU Y,FANG Y,ZHANG Y.Securing wireless sensor networks:asurvey[J].IEEE Communications Surveys&Tutorials,2008,10(3):6-28.
  • 4ZHANG J,VARADHARAJAN V.Wireless sensor network key ma-nagement survey and taxonomy[J].Journal of Network and Com-puter Applications,2010,33(2):63-75.
  • 5Jr SIMPLíCIO M A,BARRETO P S,MARGI C B,et al.A survey onkey management mechanisms for distributed wireless sensor networks[J].Computer Networks,2010,54(15):2591-2612.
  • 6ESCHENAURE L,GLIGOR V D.A key-management scheme for dis-tributed sensor networks[C]//Proc of the 9th ACM Conference onComputer and Communications Security.New York:ACM Press,2002:41-47.
  • 7CHAN H,PERRIG A,SONG D.Random key predistribution schemesfor sensor networks[C]//Proc of IEEE Symposium on Research inSecurity and Privacy.[S.l.]:IEEE Computer Society,2003:197-313.
  • 8DU W,DENG J,HAN Y S,et al.A key management scheme for wire-less sensor networks using deployment knowledge[C]//Proc of IEEEConference on Computer Communications.Piscataway:IEEE Press,2004:586-597.
  • 9DU W,DENG J,HAN Y S,et al.A key predistribution scheme forsensor networks using deployment knowledge[J].IEEE Trans onDependable and Secure Computing,2006,3(1):62-77.
  • 10LIU D,NING P.Establishing pairwise key in distributed sensor net-works[C]//Proc of the 10th ACM Conference on Computer and Com-munications Security.New York:ACM Press,2003:52-61.

共引文献113

同被引文献2

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部