首页 | 本学科首页   官方微博 | 高级检索  
     

基于碰撞模型的LED代数旁路攻击
引用本文:冀可可,王 韬,赵新杰,刘会英.基于碰撞模型的LED代数旁路攻击[J].计算机应用研究,2013,30(1):270-272.
作者姓名:冀可可  王 韬  赵新杰  刘会英
作者单位:军械工程学院 信息工程系, 石家庄 050003
基金项目:国家自然科学基金资助项目(61173191)
摘    要:针对轻型分组密码LED提出了一种基于碰撞模型的代数旁路攻击。利用代数攻击方法建立密码算法等效布尔代数方程组,采集算法运行中泄露的功耗信息并转换为碰撞信息,并将碰撞信息转换成额外方程组,从而利用CryptoMiniSAT解析器求解密钥。实验结果表明:旁路碰撞信息可有效降低方程组求解的复杂度;已知明文条件下,利用2轮最少50%的随机碰撞信息,即可在158.5 s内恢复64 bit LED完整密钥。此外,该方法也可用于其他分组密码功耗碰撞分析。

关 键 词:代数旁路攻击  碰撞模型  LED  可满足性解析器

Collision model-based algebraic side-channel attack on LED
JI Ke-ke,WANG Tao,ZHAO Xin-jie,LIU Hui-ying.Collision model-based algebraic side-channel attack on LED[J].Application Research of Computers,2013,30(1):270-272.
Authors:JI Ke-ke  WANG Tao  ZHAO Xin-jie  LIU Hui-ying
Affiliation:Dept. of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China
Abstract:This paper proposed a collision model-based algebraic side-channel attack on lightweight block cipher LED. Firstly, it described the algebraic representations of LED. Secondly, it measured the power leakages of LED on ATMEGA324P microcontroller by a digital oscilloscope, and transformed to deduce collision. Finally, the collision was expressed as algebraic equations, and it applied the CryptoMiniSAT solver to solve for the key. Experiments demonstrate that the collision of side-channel information can introduce new algebraic equations into attack, reduce the complexity of solving equations; in the known-plaintext scenario, 2 rounds collision information is enough to recover the 64 bit LED master key in 158. 5 s. The proposed method can be applied into the collision-based power attack of other block ciphers.
Keywords:algebraic side-channel attack  collision model  LED  satisfiability solver
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号