期刊文献+

分组密码Cache攻击技术研究 被引量:17

Cache Attacks on Block Ciphers
下载PDF
导出
摘要 近年来,Cache攻击已成为微处理器上分组密码实现的最大安全威胁,相关研究是密码旁路攻击的热点问题.对分组密码Cache攻击进行了综述.阐述了Cache工作原理及Cache命中与失效旁路信息差异,分析了分组密码查表Cache访问特征及泄露信息,从攻击模型、分析方法、研究进展3个方面评述了典型的分组密码Cache攻击技术,并对Cache攻击的发展特点进行了总结,最后指出了该领域研究存在的问题,展望了未来的研究方向. In recent years,cache attack has become one of the most threatening attacks to block ciphers that implemented on microprocessors.The research in this area is a hot spot of cryptographic side channel attacks.This paper summarizes the cache attacks on block ciphers.The mechanism of cache and the side channel information difference of cache hit miss are described.The characteristics of cache accesses and corresponding information leakages are analyzed.Several typical cache attack techniques on block ciphers are well discussed from the aspects of attack model,analysis method,research progress.Finally,the features of cache attacks are summarized,the current research pitfalls are provided,and the future directions of cache attacks are given.
出处 《计算机研究与发展》 EI CSCD 北大核心 2012年第3期453-468,共16页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60772082 61173191) 河北省自然科学基金项目(08M010)
关键词 微处理器 分组密码 Cache攻击 旁路攻击 查找S盒 物理安全性 microprocessor block cipher cache attack side channel attack S-Box lookup physical security
  • 相关文献

参考文献59

  • 1Kocher P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[G] //LNCS 1109: Proc of the CRYPTO 1996. Berlin: Springer, 1996:104-113.
  • 2Kocher P C, Jaffe J, Jun B. Differential power analysis [G] //LNCS 1666: Proe of CRYPTO 1999. Berlin: Springer, 1999:388-397.
  • 3Quisquater J J, Samyde D. Electromagnetic analysis (EMA) : Measures and countermeasures for smart cards [G] //LNCS 2140: e-Smart 2001. Berlin: Springer, 2001: 200- 210.
  • 4Shamir A, Tromer E. Acoustic cryptanalysis: On nosy people and noisy machines [EB/OL]. Rump Session of EuroCrypt 2004. 2004. [2011-08-09]. http://www, wisdom. weizmann, ac. il/-tromer/aeoustic/.
  • 5Boneh D, DeMillo R A, Lipton R J. On the importance of checking cryptographic protocols for faults [G] //LNCS 1233: Proc of EUROCRYPT 1997. Berlin: Springer, 1997: 37-51.
  • 6Tsunoo Y, Tsujihara E, Minematsu K, et al. Cryptanalysis of block ciphers implemented on computers with cache [C] // Proc of the Syrup on Information Theory and Its Applications. Piscataway, NJ: IEEE , 2002.. 803-806.
  • 7Kelsey J, Schneier B, Wagner D, et al. Side channel eryptanalysis of product ciphers [G] //LNCS: 1485: Proc of the 5th European Syrup on Research in Computer Security. Berlin: Pringer, 1998:97-110.
  • 8Tsunoo Y, Saito T, Suzaki T, et al. Cryptanalysis of DES implemented on computers with cache[G] //LNCS 2779.. Proe of the CHES 2003. Berlin: Springer, 2003:62-76.
  • 9Tsunoo Y, Kubo H, Shigeri M, et al. Timing attack on AES using cache delay in S-boxes[C/OL] //Proc of the Syrup on Cryptography and Information Security, SCIS 2003. Hamamatsu, Japan: The Instituteof Electronics, Information and Communication Engineers, 2003. [2012- 02-16]. http:// www. jsa. or. jp/stdz/instac/committe/tamper-resistance/TSRC report061002, pdf.
  • 10Tsunoo Y, Suzaki T, Saito T, et al. Timing attack on Camellia using cache delay in S-boxes[C/OL] //Proc of the Symp on Cryptography and Information Security, SCIS 2003. Hamamatsu, Japan: The Institute of Electronics, Information and Communication Engineers, 2003: 179-184. [2012-02-16]. http://info, isl. ntt. co. jp/crypt/eng/camellia/ reference, html.

二级参考文献116

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2吴文玲,张文涛,冯登国.Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia[J].Journal of Computer Science & Technology,2007,22(3):449-456. 被引量:20
  • 3侯方勇,谷大武,李小勇.基于Cache的AES攻击:研究进展[J].信息安全与通信保密,2007,29(8):41-43. 被引量:3
  • 4国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 5PAUL C,KOCHER.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[A].CRYPTO 1996[C].Springer,1996.104-113.
  • 6QUISQUATER J J,SAMYDE D.Electromagnetic analysis(EMA):measures and countermeasures for smart cards[A].Smart Cards Programming and Security(E-Smart 2001)[C].Springer,2001.200-210.
  • 7BONEH D,DEMILLO R A,LIPTON R J.On the importance of checking cryptographic protocols for faults[A].EUROCRYPT'97[C].Konstanz,Germany,1999.37-51.
  • 8BRUMLEY D,BONEH D.Remote timing attacks are practice[A].Proceedings of the 12th Usenix Security Symposium[C].Washington,DC,2003.1-14.
  • 9COLIN P.Cache missing for fun and profit[EB/OL].http://www.daemonology.net/hyperthreading-considered-harmful/,2005.
  • 10YUKIYASU T,TERUO S,TOMOYASU S,et aL.Cryptanalysis of DES implemented on computers with Cache[A].Cryptographic Hardware and Embedded Systems-CHES 2003[C].Springer,2003.62-76.

共引文献31

同被引文献183

引证文献17

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部