期刊文献+

白盒化Piccolo密码算法的设计与应用

Design and Application of White⁃boxed Piccolo Cryptographic Algorithm
下载PDF
导出
摘要 白盒攻击环境下敌手可以完全获取甚至改变密码算法的运行过程,给数据安全带来巨大威胁,目前移动终端、无线传感器网络(WSN)等部分轻量级应用场景均可视作白盒环境。通过改进Piccolo算法的部分结构与迭代方式将其进行白盒化实现,采用自编码查找表,根据给定的映射关系对数据分区进行标记,添加数据标记编码,并结合仿射变换等操作将密钥信息进行隐藏,能够保障较高的查表效率与白盒安全性。经安全性分析与对比,白盒化的Piccolo算法白盒多样性与白盒含混度数值较高,并且可以应对侧信道攻击、代码提取攻击、BGE攻击、MGH攻击、仿射编码恢复攻击等多种密码攻击方式,能在WSN等硬件资源受限的场景下得到良好部署与应用。 In white⁃box attack environment,adversary could completely access or even change the oper⁃ation process of cryptographic algorithms,bringing huge threats to data security.Currently,some light⁃weight application scenarios such as the mobile terminals and the wireless sensor networks(WSNs)are regarded as white⁃box environments.Part of the structure and iteration in the Piccolo algorithm are im⁃proved to be white⁃boxed.According to the given mapping relationship,the self⁃coding lookup table is adopted to mark the data partition and add data marking encoding.Combining with the affine transfor⁃mation and other operations,the key information is hidden to guarantee high lookup table efficiency and white⁃box security.Security analysis and comparison indicate that the white⁃boxed Piccolo algorithm has high white⁃box diversity and white⁃box ambiguity,and can cope with various cryptographic attacks such as side channel attack,code lifting attack,BGE attack,MGH attack,affine code recovery attack,etc.The white⁃boxed Piccolo algorithm could be well deployed and applied in the scenarios of WSN and other platforms with constrained hardware resource.
作者 杨亚涛 殷方锐 董辉 陈亮宇 刘培鹤 YANG Yatao;YIN Fangrui;DONG Hui;CHEN Liangyu;LIU Peihe(Beijing Electronic Science and Technology Institute,Beijing 100070,P.R.China;Xidian University,Xi’an 710071,P.R.China)
出处 《北京电子科技学院学报》 2024年第2期1-13,共13页 Journal of Beijing Electronic Science And Technology Institute
基金 中央高校基本科研业务费专项资金(编号:328202222,3282024058,3282024052) 北京市自然科学基金(编号:4232034)。
关键词 白盒密码 Piccolo算法 自编码查找表 FEISTEL结构 white⁃box cipher Piccolo algorithm self⁃encoding lookup table Feistel structure
  • 相关文献

参考文献7

二级参考文献29

  • 1温凤桐,吴文玲,温巧燕.改进的CBC模式及其安全性分析[J].通信学报,2007,28(3):52-56. 被引量:4
  • 2Anderson R, Kuhn M. Low cost attacks on tamper-resistant devices. In: Proc. of the 5th Int'l Workshop on Security Protocols. LNCS 1361, Springer-Verlag, 1997. 125-136. [doi: 10.1007/BFb0028165].
  • 3Biham E, Shamir A. Differential fault analysis of secret key cryptosystems. In: Proc. of the 17th Annual Int'l Cryptology Conf. on Advances in Cryptology. New York, 1997. 513-525. [doi: 10.1007/BFb0052259].
  • 4Biham E, Shamir A. Power analysis of the key scheduling of the AES candidates. In: Proc. of the 2nd AES Candidate Conf. Rome, 1999. 22-23.
  • 5Chow S, Eisen P, Johnson H, Van Oorschot PC. White-Box cryptography and an AES implementation. In: Proc. of the Selected Areas in Cryptography. LNCS 2595, Newfoundland: Springer-Verlag, 2002.250-270. [doi: 10.1007/3-540-36492-7_17].
  • 6Chow S, Eisen P, Johnson H, Van Oorschot PC. A white-box DES implementation for DRM applications. In: Proc. of the ACM Workshop on Security and Privacy in Digital Rights Management. LNCS 2692, Heidelberg: Springer-Vedag, 2002. 1-15. Idol: 10.1007/978-3-540-44993-5_1].
  • 7Jacob M, Boneh D, Felten E. Attacking an obfuscated cipher by injecting faults. In: Proc. of the ACM Workshop on Security and Privacy in Digital Rights Management. LNCS 2696, Heidelberg: Springer-Verlag, 2002. 16-31. [doi: 10.1007/978-3-540-44993- 5_21.
  • 8Wyseur B, Michiels W, Gorissen P, Preneel B. Cryptanalysis of white-box DES implementations with arbitrary external encodings. In: Proc. of the Selected Areas in Cryptography. LNCS 4876, Ottawa: Springer-Verlag, 2007. 264-277. [doi: 10.1007/978-3-540- 77360-3_17].
  • 9Goubin L, Masereel JM, Quisquater M. Cryptanalysis of white box DES implementations. In: Proc. of the Selected Areas in Cryptography. LNCS 4876, Ottawa: Springer-Verlag, 2007.278-295. [doi: 10.1007/978-3-540-77360-3_18].
  • 10Billet.O, Gilbert.H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Proc. of the Selected Areas in Cryptography. LNCS 3357, Berlin, Heidelberg: Springer-Verlag, 2005. 227-240. [doi: 10.1007/978-3-540-30564-4_16].

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部