一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

ZUC序列密碼算法的選擇IV相關(guān)性能量分析攻擊

嚴(yán)迎建 楊昌盛 李偉 張立朝

嚴(yán)迎建, 楊昌盛, 李偉, 張立朝. ZUC序列密碼算法的選擇IV相關(guān)性能量分析攻擊[J]. 電子與信息學(xué)報(bào), 2015, 37(8): 1971-1977. doi: 10.11999/JEIT141604
引用本文: 嚴(yán)迎建, 楊昌盛, 李偉, 張立朝. ZUC序列密碼算法的選擇IV相關(guān)性能量分析攻擊[J]. 電子與信息學(xué)報(bào), 2015, 37(8): 1971-1977. doi: 10.11999/JEIT141604
Yan Ying-jian, Yang Chang-sheng, Li Wei, Zhang Li-chao. Chosen-IV Correlation Power Analysis Attack of ZUC Stream Cipher[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1971-1977. doi: 10.11999/JEIT141604
Citation: Yan Ying-jian, Yang Chang-sheng, Li Wei, Zhang Li-chao. Chosen-IV Correlation Power Analysis Attack of ZUC Stream Cipher[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1971-1977. doi: 10.11999/JEIT141604

ZUC序列密碼算法的選擇IV相關(guān)性能量分析攻擊

doi: 10.11999/JEIT141604
基金項(xiàng)目: 

國家自然科學(xué)基金(61404175, 61302107)

Chosen-IV Correlation Power Analysis Attack of ZUC Stream Cipher

  • 摘要: 為了分析ZUC序列密碼算法在相關(guān)性能量分析攻擊方面的免疫能力,該文進(jìn)行了相關(guān)研究。為了提高攻擊的針對性,該文提出了攻擊方案的快速評估方法,并據(jù)此給出了ZUC相關(guān)性能量分析攻擊方案。最后基于ASIC開發(fā)環(huán)境構(gòu)建仿真驗(yàn)證平臺,對攻擊方案進(jìn)行了驗(yàn)證。實(shí)驗(yàn)結(jié)果表明該方案可成功恢復(fù)48 bit密鑰,說明ZUC并不具備相關(guān)性能量分析攻擊的免疫力,同時(shí)也證實(shí)了攻擊方案快速評估方法的有效性。相比Tang Ming等采用隨機(jī)初始向量進(jìn)行差分能量攻擊,初始向量樣本數(shù)達(dá)到5000時(shí)才能觀察到明顯的差分功耗尖峰,該文的攻擊方案只需256個(gè)初始向量,且攻擊效果更為顯著。
  • Wu H J, Huang T, Phuong H N, et al.. Differential attacks against stream cipher ZUC[C]. Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, 2012: 262-277.
    Zhou C F, Feng X T, and Lin D D. The initialization stage analysis of ZUC v1.5[C]. Proceedings of the 10th International Conference, Sanya, China, 2011: 40-53.
    Gautham S. The stream cipher core of the 3GPP encryption standard 128-EEA3: timing attacks and countermeasures[C]. Proceedings of the 7th International Conference, Beijing, China, 2011: 269-288.
    L afitte F, M arkowitch O, and Vav Heule D. SAT based analysis of LTE stream cipher ZUC[C]. Proceedings of the 6th International Conference on Security of Information and Networks, Aksavay, Turkey, 2013: 110-116.
    關(guān)杰, 丁林, 劉樹凱. SNOW 3G與ZUC流密碼的猜測決定攻擊[J]. 軟件學(xué)報(bào), 2013, 24(6): 1324-1333.
    Guan Jie, Ding Ling, and Liu Shu-kai. Guess and determine attack on SNOW 3G and ZUC[J]. Journal of Software, 2013, 24(6): 1324-1333.
    唐明, 高劍, 孫樂昊, 等. 嵌入式平臺下ZUC算法的側(cè)信道頻域攻擊[J]. 山東大學(xué)學(xué)報(bào)(理學(xué)版), 2014, 49(9): 29-34.
    Tang Ming, Gao Jian, Sun Le-hao, et al.. Side channel attacks in frequency domain for ZUC algorithm in embedded platform[J]. Journal of Shandong University(Natural Science), 2014, 49(9): 29-34.
    Reddy E K. Overview of the side channel attacks[J]. Advanced Networking and Applications, 2013, 4(6): 1799-1808.
    Paul K, Joshua J, Benjamin J, et al.. Introduction to differential power analysis[J]. Journal of Cryptography Engineering, 2011, 1(1): 5-27.
    汪鵬君, 張躍軍, 張學(xué)龍. 防御差分功耗分析攻擊技術(shù)研究[J] 電子與信息學(xué)報(bào), 2012, 34(11): 2774-2784.
    Wang Peng-jun, Zhang Yue-jun, and Zhang Xue-long. Research of differential power analysis countermeasures[J]. Journal of Electronics Information Technology, 2012, 34(11): 2774-2784.
    趙永斌, 胡予濮, 賈艷艷. 一種抵抗能量攻擊的線性反饋移位寄存器[J]. 西安電子科技大學(xué)學(xué)報(bào)(自然科學(xué)版), 2013, 40(3): 172-179.
    Zhao Yong-bin, Hu Yu-pu, and Jia Yan-yan. New design of LFSR based stream ciphers to resist power attack[J]. Journal of Xidian University (Natural Science), 2013, 40(3): 172-179.
    Kumar S, Lemke K, and Paar C. Some thoughts about implementation properties of stream ciphers[C]. Proceedings of State of the Art of Stream Ciphers Workshop, Brugge, Belgium, 2004: 311-319.
    Stefan M, Elisabeth O, and Thomas P著. 馮登國, 周永斌, 劉繼業(yè), 等譯. 能量分析攻擊[M]. 北京: 科學(xué)出版社, 2010: 45-46.
    金晨輝, 鄭浩然, 張少武, 等. 密碼學(xué)[M]. 北京: 高等教育出版社, 2009: 149-150.
    Jin Chen-hui, Zheng Hao-ran, Zhang Shao-wu, et al.. Cryptography[M]. Beijing: Higher Education Press, 2009: 149-150.
    楊昌盛, 于敬超, 嚴(yán)迎建. Grain-128同步流密碼的選擇初始向量相關(guān)性能量攻擊[J]. 計(jì)算機(jī)應(yīng)用, 2014, 34(5): 1318-1321.
    Yang Chang-sheng, Yu Jing-chao, and Yan Yin-jian. Chosen initial vector correlation power attack on synchronous stream cipher Grain-128[J]. Journal of Computer Applications, 2014, 34(5): 1318-1321.
    劉澤藝, 高能, 屠晨陽, 等. 一種抗能量分析攻擊的復(fù)合寄存器系統(tǒng)[J]. 密碼學(xué)報(bào), 2014, 1(5): 411-421.
    Liu Ze-yi, Gao Neng, Tu Chen-yang, et al.. A compound register system against power analysis attack[J]. Journal of Cryptologic Research, 2014, 1(5): 411-421.
    劉會英, 趙新杰, 王韜, 等. 基于漢明重的SMS4密碼代數(shù)旁路攻擊研究[J]. 計(jì)算機(jī)學(xué)報(bào), 2013, 36(6): 1183-1193.
    Liu Hui-yin, Zhao Xin-jie, Wang Tao, et al.. Research on hamming weight-based algebraic side-channel attacks on SMS4[J]. Chinese Journal of Computers, 2013, 36(6): 1183-1193.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  2235
  • HTML全文瀏覽量:  312
  • PDF下載量:  870
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2014-12-15
  • 修回日期:  2015-04-14
  • 刊出日期:  2015-08-19

目錄

    /

    返回文章
    返回