期刊文献+

Grain-128序列密码的能量分析攻击

Power Analysis Attack of Grain-128 Stream Cipher
下载PDF
导出
摘要 为了分析Grain-128序列密码算法在能量分析攻击方面的免疫能力,对其进行了能量分析攻击研究.为提高攻击的针对性,首先对序列密码算法功耗特性进行了分析,认为攻击点功耗与其他功耗成分之间的相关性是导致序列密码能量分析攻击困难的主要原因,据此提出了攻击点和初始向量选取合理性的评估方法,并给出了Grain-128的能量分析攻击方案.最后基于ASIC开发环境构建仿真攻击平台,对攻击方案进行了验证,结果显示该方案可成功攻击46 bit密钥,证实了所提出的攻击点和初始向量选取合理性评估方法的有效性,同时表明Grain-128不具备能量分析攻击的免疫能力. To analyze immunity of Grain-128 stream cipher in aspect of power analysis attack, researches were conducted. Power analyses of stream ciphers were considered to be more difficult than block ciphers' and public ciphers' in academia. In order to improve the pertinence of attack, firstly, power characteristic of stream cipher algorithm was analyzed, and the reason for the difficulty of the attack was considered to be the correlation between the attack point power and other power components. Then a strategy for evaluating rationality of the selection of attack point and initial vectors was presented based on the judgment, and a power analysis scheme of Grain-128 was proposed based on the strategy. Finally an attack simulation platform was raised based on ASIC development environment, and the attack scheme of Grain-128 was validated using the platform. Experiment results show that the attack scheme can be successfully attacked 46-bit key, confirming the effectiveness of the proposed strategy for evaluating rationality of the selection of attack point and initial vectors, at the same time the Grain-128 is unable to resist the power attack.
出处 《北京工业大学学报》 CAS CSCD 北大核心 2015年第6期842-850,共9页 Journal of Beijing University of Technology
基金 国家自然科学基金资助项目(61404175 61302107)
关键词 序列密码 Grain-128 能量分析攻击 stream cipher Grain-128 power analysis attack
  • 相关文献

参考文献20

  • 1DINUR I, SHAMIR A. Breaking grain-12g with dynamic cube attacks [ C ] fJ Fast Software Encryption. Berlin: Springer, 2011 : 167-187.
  • 2DING L, GUAN J. Related key chosen IV attack on grain- 128a stream cipher[ J]. IEEE Transactions on Information Forensics and Security, 2013, 8 (5) : 803-809.
  • 3BANIK S, MAITRA S, SARKAR S, et al. A chosen IV related key attack on grain-128a[ C] if Information Security and Privacy. Berlin: Springer, 2013 : 13-26,.
  • 4DATTA P, ROY D, MUKHOPADHYAY S. A probabilistic algebraic attack on the grain family of stream ciphers [ C ] ff Network and System Security. Berlin: Springer International Publishing, 2014: 558-565.
  • 5LEHMANN M, MEIER W. Conditional differential cryptanalysis of grain-128a [ C ] Jj Cryptology and Network Security. Berlin: Springer, 2012: 1-11.
  • 6BANIK S. Some insights into differential cryptanalysis of grain vl [ C ] ff Information Security and Privacy. Wollongong: Springer International Publishing, 2014 : 34- 49.
  • 7ZHANG B, LI Z Q, FENG D G, et al. Near collision attack on the grain vl stream cipher [ C ] ff Fast SoftwareEncryption. Berlin: Springer, 2013: 518-538.
  • 8KARMAKAR S, CHOWDHURY D R. Fault analysis of grain-128 by targeting NFSR[ C ] ff Progress in Cryptology o AFRICACRYPT 2011. Berlin: Springer, 2011 : 298-315.
  • 9BAN1K S, MAITRA S, SARKAR S. A differential fault attack on the grain family of stream ciphers [ C ] // Cryptographic Hardware and Embedded Systems-GHES 2012. Berlin: Springer, 2012: 122-139.
  • 10BANIK S, MAITRA S, SARKAR S. A differential fault attack on grain-128a using MACs [ C ] //// Security, Privacy, and Applied Cryptography Engineering. Berlin: Springer, 2012 : 111-125.

二级参考文献38

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 3Kocher P C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems [G]// CRYPTO'1996, LNCS 1440. Berlin: Springer, 1996: 104-113.
  • 4Koeher P C, Jaffe J, Jun B. Differential Power Analysis[C]//CRYPTO'1999, LNCS 1666. Berlin: Springer, 1999: 388-397.
  • 5Lano J, Mentens N, Preneel B, et al. Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism [C]//SASC 2004, Workshop Record. Berlin: Springer-Verlag, 2004: 327-333.
  • 6Gierlichs B, Batina L, Clavier C, et al. Susceptibility of eSTREAM Candidates Towards Side Channel Analysis [EB/ OL]. [2012-02-23]. http://www, ecrypt, eu. org/stvl/sasc2008/index, html.
  • 7Fischer W, Gammel B M, Kniffler O, et al. Differential Power Analysis of Stream Ciphers [C]//Advances in Cryptology-CT-RSA 2007, LNCS 4377. Berlin: Springer, 2006: 257-270.
  • 8Burman S, Mukhopadhyay D, Veezhinathan K, et al. LFSR Based Stream Ciphers are Vulnerable to Power Attacks [C]//Advances in Crptology-INDOCRYPT'2007, LNCS 4859. Berlin: Springer, 2007: 384-392.
  • 9Steve B, Julia B, Vesselin V. The eSTREAM Portfolio in 2012 (Jan 2012) [EB/OL]. [2012-02-23]. http://www.ecrypt, eu. org/stream/.(12): 1709-1720.
  • 10Kumar S, Lemke K, Paar C. Some Thoughts about Implementation Properties of Stream Ciphers [C]//SASC 2004, Workshop Record. Berlin: Springer-Verlag, 2004: 311-319.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部