期刊文献+

针对LBlock算法踪迹驱动Cache攻击S盒特性分析

Completeness Analysis on S-Box of Trace Driven Cache Timing Attack against LBlock Algorithm
下载PDF
导出
摘要 针对轻量级密码LBlock算法的Cache计时研究,着重分析密码算法中S盒的非线性结构特征。基于其结构特征推导出S盒的真值表,求解得出S盒输入输出关系的代数表达式;再结合LBlock算法的加密过程和轮函数F的结构,推导出每个轮运算的表达式以及S盒查找索引的代数表达式;结合踪迹驱动Cache计时攻击的攻击原理与模型,总结得出针对LBlock算法Cache攻击中密钥分析的核心表达式,结果表明LBlock算法存在遭受Cache计时攻击的可能性。 Aiming at the study of the cache timing attack for lightweight block cipher called LBlock,we focused on the analysis of the nonlinear structure characteristics of S box in cryptographic algorithms.Firstly,we derived the truth-table of S box based on its structure feature to obtain the relation algebra expression between inputs and outputs of S box. Secondly,with reference of encryption process of the LBlock algorithm and the structure of round function F,the operation expression of each round and the algebra expressions of look-up index for S box were deduced. Finally,we summarized the core expression of the analysis of the key in the cache attack for LBlock algorithm on the basis of the principle and model of the trace-driven cache timing attack. The final conclusion shows that the LBlock algorithm has the possibility of the cache timing attack.
出处 《兵器装备工程学报》 CAS 2016年第8期146-150,180,共6页 Journal of Ordnance Equipment Engineering
关键词 LBlock算法 CACHE计时攻击 代数表达式 S盒 特性分析 LBlock algorithm Cache timing attack algebra expression S box characteristic analysis
  • 相关文献

参考文献3

二级参考文献39

  • 1Wu Wenling,Zhang Lei.LBlock:A Lightweight Block Cipher[C]//Proceedings of ACNS’11.Heidelberg,Germany:Springer,2011:327-344.
  • 2Hong D,Sung J,Hong S,et al.HIGHT:A New Block CipherSuitable for Low-resource Device[C]//Proceedings of CHES’06.Heidelberg,Germany:Springer,2006:46-59.
  • 3de Canniere C,Dunkelman O,Knezevic M.KATAN andKTANTAN:A Family of Small and Efficient Hardware-orientedBlock Ciphers[C]//Proceedings of CHES’09.Heidelberg,Germany:Springer,2009.
  • 4Lim C,Korkishko T.mCrypton:A Lightweight Block Cipher forSecurity of Low-cost RFID Tags and Sensors[C]//Proceedings ofWISA’05.Heidelberg,Germany:Springer,2006:243-258.
  • 5Kam J B,Davida G I.Structured Design of Substitution-permutation Encryption Networks[J].IEEE Trans.on Computers,1979,28(10):747-753.
  • 6Feistel H.Cryptography and Computer Privacy[J].ScientificAmerican,1973,228(5):15-23.
  • 7Preneel B,Bosselaers A,Rijmen V.Comments by the NESSIEProject on the AES Finalists[EB/OL].[2010-11-24].http://www.nist.gov/aes.
  • 8Englund H,Johansson T,Turan M S.A Framework for Chosen IVStatistical Analysis of Stream Ciphers[C]//Proceedings ofINDOCRYPT’07.Heidelberg,Germany:Springer,2007.
  • 9Shannon C E. Communication theory of secrecy systems [ J ]. Bell System Technology Journal, 1949, 28:656 -715.
  • 10Robert A, Matthews J. On the derivation of a "chaotic" encryption algorithm [ J ]. Cryptologia, 1989, X III ( 1 ) : 29 - 42.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部