期刊文献+

DES密码旁路立方体分析

Side Channel Cube Attacks on DES
下载PDF
导出
摘要 将立方体分析和旁路攻击结合,基于8位汉明重泄露模型,首次对DES分组密码抗旁路立方体攻击安全性进行了评估.在黑盒攻击场景下,攻击者首先按照一定规则生成立方体和超多项式,然后利用不同选择明文,计算其在加密过程某比特的高阶差分,判断该立方体对应的超多项式是否合法.对DES加密输出第l轮输出不同字节进行了黑盒旁路立方体攻击实验,结果表明:未经防护的DES密码易遭黑盒旁路立方体攻击;如果攻击者能够精确获取加密第1轮输出某一字节的汉明重泄露,最好的攻击结果为2^9.35个选择明文可将DES主密钥搜索空间降至2^15. In this paper ,we investigate the security of DES block cipher against side-channel cube attacks based on 8-bit Hamming weight leakage model. Under the black-attack scenario, the adversary firstly generates random cube and superpoly. Then the cube is used to generate chosen plaintexts. The adversary deduces one bit of the intermediate state from the side channel attack for each chosen plaintext and computes the high order differences of these one bit values to verify the relations between the cube and superpoly. Simulation experiments are launched on output of first round of DES. The results demonstrate that the unprotected implementation of DES is vulnerahle to side-channel cube attacks. If the adversary can accurately deduce the Hamming weight of the intermediate states from the side-channel leakages, many cubes and superpolys can be extracted and used for key recovery. The best experiment result is 2^9.35 chosen plaintexts, which can reduce the DES master keysearch space to 2^15.
出处 《军械工程学院学报》 2013年第3期64-69,共6页 Journal of Ordnance Engineering College
基金 国家自然科学基金项目(61173191)
关键词 旁路立方体攻击 黑盒攻击 汉明重泄露 DES 分组密码 side-channel cube attack black-box attack Hamming weight DES block cipher
  • 相关文献

参考文献15

  • 1ABDUL-LATIP S, REYHANITABAR M,SUSILO W,et al. On the security of NOEKEON against side channel cube attacks [C]//ISPEC 2010. Berlin: LNCS, 2010, 6047:45-55.
  • 2宋海欣,范修斌,武传坤,冯登国.流密码算法Grain的立方攻击[J].软件学报,2012,23(1):171-176. 被引量:12
  • 3DINUR I, SHAMIR A. Breaking grain-128 with dynamic cube attacks[C]//FSE 2011. Berlin: LNCS, 2011,6733 .. 167 187.
  • 4LATHROP J. Cube attacks on cryptographic hashfunc- tions[D]. Rochester: Rochester Institute of Technology, 2009.
  • 5李超,屈龙江,李强.对DES密码的一种新的线性分析[J].国防科技大学学报,2004,26(3):43-47. 被引量:4
  • 6AUMASSON J, DINUR I, MEIER W, et al. Cube testers and key recovery attacks on reduced-round MD6 and trivium[-C]//FSE 2009. Berlin : LNCS, 2009,5665 : 1- 22.
  • 7崔国华,张友明,洪帆.6圈和8圈DES的差分攻击改进及实现[J].华中科技大学学报(自然科学版),2003,31(5):17-19. 被引量:1
  • 8RIVAIN M. Differential fault analysis on DES middle rounds[C]//CHES 2009. Berlin: LNCS, 2009,5747: 457-469.
  • 9Data encryption standard. Federal information process- ing standard(FIPS)[S]. US Department of Commerce, 1977.
  • 10DINUR I, SHAMIR A. Side channel cube attacks on block ciphers[EB/OL]. [2009-03-18]. http://eprint, ia- cr. org/2009/127, pdf. YANG L,WANG M, QIAO S. Side channel cube attack on PRESENT [C]//CANS 2009. Berlin= LNCS, 2009,.5888379-391.

二级参考文献26

  • 1陈开颜,赵强,张鹏,邓高明.DES加密实现的差分功耗分析仿真[J].军械工程学院学报,2006,18(3):41-43. 被引量:6
  • 2Matsui M.Linear Cryptanalysis Method for DES Cipher[R]. In: Advances in Cryptology-Eurocrypt'93, LNCS 765. Springer-Verlag, 1993, 386-397.
  • 3Chabaud F, Vaudenay S. Links between Differential and Linear Cryptanalysis[R]. Advances in Cryptology-Eurocrypt '94(LNCS No. 950), SpringerVerlag, 1995: 356 - 365.
  • 4Nyberg K. Linear Approximation of Block Cipher[R]. Advances in Crytology-Eurocrypt'94 (LNCS No. 950), Springer-Verlag, 1995:439- 444.
  • 5eSTREAM-ECRYPT stream cipher project, http://www.ecrypt.eu.org/stream/.
  • 6Hell M, Johansson T. Breaking the F-FCSR-H stream cipher in real time. In: Pieprzyk J, ed. Proc. of the ASIACRYPT 2008. LNCS 5350, Heidelberg: Springer-Verlag, 2008. 557-569. [doi: 10.1007/978-3-540-89255-7_34].
  • 7Hell M, Johansson T, Meier W. Grain--A stream cipher for constrained environments, eSTREAM-ECRYPT Stream Cipher Project Report, 2005/010, 2005. http://www.ecrypt.eu.org/stream/ciphers/grain/grain.pdf [doi: 10.1504/IJWMC.2007.013798].
  • 8Berbain C, Gilbert H, Maximov A. Cryptanalysis of Grain. In: Robshaw MJB, ed. Proc. of the FSE 2006. LNCS 4047, Heidelberg: Springer-Verlag, 2006. 15-29. [doi: 10.1007/11799313_2].
  • 9Khazaei S, Hassanzadeh M, Kiaei M. Distinguishing attack on Grain. eSTREAM-ECRYPT Stream Cipher Project Report, 2005/071, 2005. http://www.ecrypt.eu.org/stream/papersdir/071.pdf.
  • 10Kucuk O. Slide resynchronization attack on the initialization of Grain 1.0. eSTREAM-ECRYPT Stream Cipher Project Report, 2006/044, 2006. http://www.ecrypt.eu.org/stream/papersdir/2006/044.ps.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部