期刊文献+

线性反馈移位寄存器的差分能量攻击 被引量:8

Differential Power Attack on Liner Feedback Shift Register
下载PDF
导出
摘要 能否有效去除算法噪声的影响,直接关系到能量攻击成败。该文以线性反馈移位寄存器(LFSR)相邻两个时钟周期的能量消耗差异为出发点,提出了一种新的差分能量攻击算法。它从根本上去除了密码算法噪声在攻击过程中带来的影响。由于该算法随机选择初始向量(initialization vector),从而使攻击者能够容易地将其推广到具有类似结构的流密码体制。为了进一步验证攻击算法的有效性,该文利用软件仿真的方法对DECIM进行了模拟攻击。仿真结果表明,该攻击算法能够有效降低LFSR的密钥搜索的复杂度。 Whether the algorithm noise can be effectively wiped off decides the success or loss of the power analysis attack. This paper offers a new differential power analysis attack algorithm, which is based on the consumed power differences between two neighboring clock cycles of liner feedback shift register. This new attack algorithm radically wipes off the effect of cipher algorithm noise in the process of attack. Because this algorithm randomly chooses initialization vectors, the attackers can easily extend the algorithm to other stream ciphers that have similar structures. In order to further validate the algorithm's availability, simulative attacks on DECIM are carried on with the method of software simulation. And the result shows that this algorithm can effectively reduce the complexity of the exhaustive search on LFSR.
出处 《电子与信息学报》 EI CSCD 北大核心 2009年第10期2406-2410,共5页 Journal of Electronics & Information Technology
关键词 流密码 差分能量攻击 线性反馈移位寄存器 DECIM 复杂度 Stream cipher Differential Power Attack (DPA) Liner Feedback Shift Register (LFSR) DECIM Complexity
  • 相关文献

参考文献11

  • 1Jean-Jacques Quisquater and Math RiZK. Side channel attacks, http://www.ipa.go.jp/security/enc/CRYPTREC/ fy15/doc/1047_Side_Channel_report.pdf, 2008.9. 被引量:1
  • 2Zhou Yong-bin and Feng Deng-guo, et al.. Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing, http://eprint.iacr. org/2005 / 388.pdf, 2008.4. 被引量:1
  • 3Courtois N T and Meier W, et al.. Algebraic attacks on stream ciphers with linear feedback [C]. Advances in Eurocrypt 2003, Warsaw Poland, Lecture Notes in Computer Science, May 4-8, 2003, Vol. 2656: 345-359. 被引量:1
  • 4Kocher P C, Jae J, and Jun B, et al.. Differential power analysis [C]. CRYPTOv 99, Santa Barbara, CA, USA, Lecture Notes in Computer Science, Aug 15-19, 1999, Vol. 1666: 388-397. 被引量:1
  • 5Gierlichs B, Batina L, and Clavier C, et al.. Susceptibility of eSTREAM candidates towards side channel analysis. http://www.ecrypt.eu.org/stream, 2008.3. 被引量:1
  • 6ECRYPT. eSTREAM, http://www.ecrypt.eu.org/stream/, 2008.9. 被引量:1
  • 7Lano J, Mentens N, and Preneel B, et al.. Power analysis of synchronous stream ciphers with resynchronization mechanism [C]. SASC Workshop, Novotel Brugge Centrum, Belgium, Workshop Record, Oct 14-15, 2004: 327-333. 被引量:1
  • 8Burman S, Mukhopadhyay D, and Veezhinathan K, et al.. LFSR based stream ciphers are vulnerable to power attacks [C]. INDOCRYPT 2007, Chennai, INDIA, Lecture Notes in Computer Science, Dec 9-13, 2007, Vol. 4859: 384-392. 被引量:1
  • 9Fischer W, Gammel B M, and Kniffier O, et al.. Differential power analysis of stream ciphers [C]. CT-RSA 2007, San Francisco, CA, USA, Lecture Notes in Computer Science, Feb 5-9, 2007, Vol. 4377: 257-270. 被引量:1
  • 10Berbain C, Billet O, and Canteaut A, et al.. DECIMv2. http: / /www.ecrypt.eu.org/stream/ decim/ decim_p3.pdf, 2007.5. 被引量:1

同被引文献150

  • 1赵佳,曾晓洋,韩军,王晶,陈俊.抗差分功耗分析攻击的AES算法的VLSI实现[J].计算机研究与发展,2007,44(3):378-383. 被引量:7
  • 2阎石.数字电子技术基础[M].北京:高等教育出版社,2008. 被引量:22
  • 3赵佳,曾晓洋,韩军,陈俊.简化的抗零值功耗分析的AES算法及其VLSI实现[J].计算机工程,2007,33(16):220-222. 被引量:1
  • 4Coppersmith D,Krawczyk D,and Mansour Y.The shrinking generator[C].CRYPTO'93.Santa Barbara,USA,SpringerVerlag,1993:22-39. 被引量:1
  • 5Meier W and Staffelbach O.The self-shrinking generator[C].EUROCRYPT'94.Santa Barbara,USA,Springer-Verlag,1994:205-214. 被引量:1
  • 6Gouget A and Sibert H.The bit-search generator[C].In The State of the Art of Stream Ciphers:Workshop Record,Brugge,Belgium,2004:60-68. 被引量:1
  • 7Debraize B and Goubin L.Guess-and-determine algebraic attack on the self-shrinking generator[C].FSE 2008.Lausanne,Switzerland,Spinger-Verlag,2008:235-252. 被引量:1
  • 8Kanso A A.Modified clock-controlled alternating step generators[J].Computer Communications,2009,32(5):787-799. 被引量:1
  • 9Hell M and Johansson T.Some attacks on the bit-search generator[C].FSE 2005.Berlin,Germany,Springer-Verlag,2005:215-227. 被引量:1
  • 10Hell M and Johansson T.Two new attacks on the self-shrinking generator[J].IEEE Transactions on Information Theory,2006,52(8):3837-3843. 被引量:1

引证文献8

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部