期刊文献+

基于未知故障模型的多重持续故障分析

Multiple Persistent Faults Analysis with Unknown Faults
下载PDF
导出
摘要 持续故障分析是2018年提出的一种新型故障分析技术,该技术引起了国内外学者的广泛关注。目前虽然已经提出了各种针对不同密码系统的相关分析方法,但针对未知故障数量的故障模型的研究仍然一片空白。然而这是一种更为实际的攻击条件,尤其在多故障时,攻击者难以控制原始值集合与故障值集合没有重合。基于此,文章提出一种相对宽松的故障模型下的多重持续故障分析模型。攻击者无需知道任何关于故障值、位置,甚至数量的信息。充分利用持续故障在所有加密过程中保持不变的特性,利用密文不同字节的结果缩小故障值范围,最终达到恢复密钥的目的。理论证明和仿真实验验证了分析模型的有效性。以AES-128算法为例,在仅密文的条件下仅使用150条密文就可以将候选密钥数量控制在很小的范围内,攻击成功率为99%以上,有效减少了所需密文数量。当频繁更换密钥后,成功通过增加循环轮数恢复密钥,显著降低了攻击难度。 Persistent Fault Analysis(PFA)is a novel fault analysis technique proposed in 2018,which has attracted widespread attention from home and abroad.Although various analysis methods for different cryptographic systems have been proposed,research on the fault model with unknown fault values is still an open problem,which represents a more practical attack scenario.Particularly when dealing with multiple faults,it is more difficult to control the overlap of the original and faulty values.This paper proposed a multiple persistent fault analysis model under a relatively loose fault model.Attackers did not need to know any information about fault values,locations,or even number.By exploiting the property that persistent faults remained unchanged during all encryption processes,the range of fault values was narrowed down using the results of different bytes of ciphertext,eventually leading to key recovery.Both theoretical proof and simulation experiments were conducted to verify the effectiveness of the analysis model.Taking the AES-128 algorithm as an example,with only 150 ciphertexts under the condition of ciphertext-only,the number of candidate keys can be controlled within a small range.The success rate of the attack is above 99%,effectively reduce the required number of ciphertexts.By increasing the number of rounds,the key can be recovered even after frequent key-update,significantly reducing the difficulty of the attack.
作者 毛红晶 程驭坤 胡红钢 MAO Hongjing;CHENG Yukun;HU Honggang(Key Laboratory of Electromagnetic Space Information,Chinese Academy of Science,Hefei 230027,China;School of Cyber Science,University of Science and Technology of China,Hefei 230027,China)
出处 《信息网络安全》 CSCD 北大核心 2023年第5期41-49,共9页 Netinfo Security
基金 国家自然科学基金[61972370]。
关键词 持续故障分析 侧信道攻击 AES算法 故障注入攻击 persistent faults analysis side-channel attacks AES algorithm fault injection attacks
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部