期刊文献+

适用于受限设备的轻量级密码综述 被引量:10

Review on lightweight cryptography suitable for constrained devices
下载PDF
导出
摘要 随着物联网的快速发展,受限设备的安全性受到了严重的挑战,轻量级密码作为受限设备的主要安全措施受到越来越多研究人员的关注。针对轻量级密码的设计策略、安全性和实现性能问题的研究进展作了综述。阐述了轻量级密码常用的设计策略及设计中的关键问题,并对当前典型和常见的轻量级密码从原理、实现机制等诸多方面进行了分析和讨论。归纳总结了轻量级密码安全分析的常用方法,并强调了旁路攻击的威胁与加入防护机制时应注意的问题;从轻量级密码性能的各项重要指标的角度详细对比和分析了现有的轻量级密码算法,指出了面向硬件和面向软件实现的轻量级密码各自适用的场合;最后进一步指明了当前轻量级密码研究中尚未解决的一些难题和未来可能发展的方向。结合轻量级密码自身特征和其应用的环境等特点,指出轻量级密码安全性和实现性能的综合评估是未来值得不断深入研究的问题。 With the rapid development of the Internet of Things (IoT), security of constrained devices suffer a serious challenge. LightWeight Cryptography (LWC) as the main security measure of constrained devices is getting more and more attention of researchers. The reeent advance in issues of lightweight cryptography such as design strategy, security and performance were reviewed. Firstly, design strategies and the key issues during the design were elaborated, and many aspects such as principle and implementation mechanisms of some typical and common lightweight cryptography were analyzed and discussed. Then not only the commonly used cryptanalysis methods were summarized but also the threat of side channel attacks and the issues should be noted when adding resistant mechanism were emphasized. Furthermore, detailed comparison and analysis of the existing lightweight cryptography from the perspective of the important indicators of the performance of lightweight cryptography were made, and the suitable environments of hardware-oriented and software-oriented lightweight cryptography were given. Finally, some unresolved difficult issues in the current and possible development direction in the future of lightweight cryptography research were pointed out. Considering characteristics of lightweight cryptography and its application environment, comprehensive assessment of security and performance will be the issues which worth depth researching in the future.
出处 《计算机应用》 CSCD 北大核心 2014年第7期1871-1877,共7页 journal of Computer Applications
基金 国家自然科学基金资助项目(60873216) 四川省科技支撑计划重点资助项目(2012GZ0017) 四川省教育厅重点基金资助项目(12ZA223)
关键词 轻量级密码 安全分析 性能评估 受限设备 LightWeight Cryptography (LWC) cryptanalysis performance evaluation constrained device
  • 相关文献

参考文献50

  • 1JUELS A,WEISS A.Authenticating pervasive devices with human protocols[C]// Advances in Cryptology-CRYPTO 2005,LNCS 3621.Heidelberg:Springer,2005:293-308.
  • 2POSCHMANN A Y.Lightweight cryptography:Cryptographic engineering for a pervasive world[M].Bochum:Ruhr-University Bochum,2009.
  • 3吴文玲, 范伟杰, 张蕾.轻量级分组密码研究进展[C]∥中国密码学发展报告, 2010:140-159.
  • 4MORADI A,POSCHMANN A,LING S,et al.Pushing the limits:a very compact and a threshold implementation of AES[C]// Proceedings of the 30th Annual International Conference on Theory and Applications of Cryptographic Techniques,LNCS 6632.Berlin:Springer-Vedag,2011:69-88.
  • 5LEANDER G,PAAR C,POSCHMANN A,et al.New lightweight DES variants[C]//Fast Software Encryption,LNCS 4595.Berlin:Springer-Verlag,2007:196-210.
  • 6HONG D,SUNG J,HONG S,et al.HIGHT:a new block cipher suitable for low-resource device[C]// Proceedings of the 8th International Conference on Cryptographic Hardware and Embedded Systems,LNCS 4249.Berlin:Springer-Verlag,2006:46-59.
  • 7STANDAERT F X,PIRET G,GERSHENFELD N,et al.SEA:a scalable encryption algorithm for small embedded applications[C]// Proceedings of the 7th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications,LNCS 3928.Berlin:Springer-Verlag,2006:222-236.
  • 8BOGDANOV A,KNUDSEN L R,LEANDER G,et al.PRESENT:an ultra-lightweight block cipher[C]//Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems,LNCS4727.Berlin:Springer-Vedag,2007:450-466.
  • 9de CANNIERE C,DUNKELMAN O,KNEZEVIC M.KATAN and KTANTAN—a family of small and efficient hardware-oriented block ciphers[C]// Proceedings of the 11 th International Workshop on Cryptographic Hardware and Embedded Systems,LNCS 5747.Berlin:Springer-Verlag,2009:272-288.
  • 10IZADI M,SADEGHIVAN B,SADEGHIAN S S,et al.MIBS:a new lightweight block cipher[C]//Proceedings of the 8th International Conference on Cryptology and Network Security,LNCS 5888.Berlin:Springer-Vedag,2009:334-348.

二级参考文献69

  • 1刘鸣,陈弘毅,白国强.功耗分析研究平台及其应用[J].微电子学与计算机,2005,22(7):134-138. 被引量:15
  • 2唐明,汪波,杨欣,张焕国.分组密码的硬件实现[J].哈尔滨工业大学学报,2006,38(9):1558-1562. 被引量:4
  • 3ECRYPT. The Side Channel Cryptanalysis Lounge[ EB/OL]. [2010 -04 -15]. http://www.crypto. ruhr-uni-bochum, de/en_sclounge. html.
  • 4KOCHER P, JAFFE J, JUN B. Differential power analysis[C]// CRYPTO'99, LNCS 1666. Berlin: Springer-Verlag, 1999: 388-397.
  • 5BRIER E, CLAVIER C, OLIVIER F. Correlation power analysis with a leakage model [ C]//CHES 2004, LNCS 3156. Berlin: Springer-Verlag, 2004:16 - 29.
  • 6CORON J-S. Resistance against differential power analysis for elliptic curve cryptosystems[ C]// CHES 1999, LNCS 1717. Berlin: Springer-Verlag, 1999:292 - 302.
  • 7BIHAM E, SHAMIR A. Power analysis of the key scheduling of the AES candidates [C]//Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference. [ S. l. ] : Addison-Wesley, 1999:115 - 121.
  • 8NOVAK R. SPA-based adaptive chosen-ciphertext attack on RSA implementation[C]// PKC 2002, LNCS 2274. Berlin: Springer- Verlag, 2002:252-262.
  • 9SCHINDLER W. A timing attack against RSA with the Chinese remainder theorem[C]// CHES 2000, LNCS 1965. Berlin: Springer- Verlag, 2000:109 - 124.
  • 10CANNIlY, RE C , DUNKELMAN O , KNEZEVICM . KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers[C]// CHES 2009, LNCS 5747. Berlin: Springer-Verlag, 2009:272-288.

共引文献16

同被引文献55

引证文献10

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部