A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover...A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the secu-rity of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.展开更多
Power analysis is a non-invasive attack against cryptographic hardware,which effectively exploits runtime power consumption characteristics of circuits.This paper proposes a new power model which combines Hamming Dist...Power analysis is a non-invasive attack against cryptographic hardware,which effectively exploits runtime power consumption characteristics of circuits.This paper proposes a new power model which combines Hamming Distance model and the model based on the template value of power consumption in combinational logic circuit.The new model can describe the power consumption characteristics of sequential logic circuits and those of combinational logic as well.The new model can be used to improve the existing power analysis methods and detect the information leakage of power consumption.Experimental results show that,compared to CPA(Correlation Power Analysis)method,our proposed attack which adopt the combinational model is more efficient in terms of the number of required power traces.展开更多
Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new cr...Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new criterion for designing Filter-Combiner model was alsoproposed: the total length I. of Linear Finite State Machines used in the model should be largeenough and the degree d of Filter-Combiner function should be approximate [L/2].展开更多
基金Supported by the National Key Foundation Research "973" project (No.G1999035802) and the National Natural Science Foundation of China (No.60273027).
文摘A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the secu-rity of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.
基金supported by Major State Basic Research Development Program(No. 2013CB338004)National Natural Science Foundation of China(No.61402286, 61202372,61202371,61309021)National Science and Technology Major Project of the Ministry of Science and Technology of China (No.2014ZX01032401-001)
文摘Power analysis is a non-invasive attack against cryptographic hardware,which effectively exploits runtime power consumption characteristics of circuits.This paper proposes a new power model which combines Hamming Distance model and the model based on the template value of power consumption in combinational logic circuit.The new model can describe the power consumption characteristics of sequential logic circuits and those of combinational logic as well.The new model can be used to improve the existing power analysis methods and detect the information leakage of power consumption.Experimental results show that,compared to CPA(Correlation Power Analysis)method,our proposed attack which adopt the combinational model is more efficient in terms of the number of required power traces.
文摘Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new criterion for designing Filter-Combiner model was alsoproposed: the total length I. of Linear Finite State Machines used in the model should be largeenough and the degree d of Filter-Combiner function should be approximate [L/2].