ZUC序列密碼算法的選擇IV相關(guān)性能量分析攻擊
doi: 10.11999/JEIT141604
-
1.
(解放軍信息工程大學(xué) 鄭州 450000) ②(復(fù)旦大學(xué)微電子學(xué)院 上海 200433) ③(天津大學(xué)電子信息工程學(xué)院 天津 300072)
基金項(xiàng)目:
國家自然科學(xué)基金(61404175, 61302107)
Chosen-IV Correlation Power Analysis Attack of ZUC Stream Cipher
-
1.
(PLA Information Engineering University, Zhengzhou 450000, China)
-
摘要: 為了分析ZUC序列密碼算法在相關(guān)性能量分析攻擊方面的免疫能力,該文進(jìn)行了相關(guān)研究。為了提高攻擊的針對性,該文提出了攻擊方案的快速評估方法,并據(jù)此給出了ZUC相關(guān)性能量分析攻擊方案。最后基于ASIC開發(fā)環(huán)境構(gòu)建仿真驗(yàn)證平臺,對攻擊方案進(jìn)行了驗(yàn)證。實(shí)驗(yàn)結(jié)果表明該方案可成功恢復(fù)48 bit密鑰,說明ZUC并不具備相關(guān)性能量分析攻擊的免疫力,同時(shí)也證實(shí)了攻擊方案快速評估方法的有效性。相比Tang Ming等采用隨機(jī)初始向量進(jìn)行差分能量攻擊,初始向量樣本數(shù)達(dá)到5000時(shí)才能觀察到明顯的差分功耗尖峰,該文的攻擊方案只需256個(gè)初始向量,且攻擊效果更為顯著。Abstract: To analyze the immunity of ZUC stream cipher in aspect of correlation power analysis attack, some relevant researches are conducted. In order to improve the pertinence of attack, a rapid assessment method of the attack scheme is presented, and accordingly a correlation power analysis scheme of ZUC is proposed. Finally, based on the simulation platform raised by ASIC development environment, the attack scheme is validated. Experiment results turn out that the scheme can successfully attack 48-bit key, confirming that ZUC is unable to resist the correlation power analysis attack, and the proposed assessment method of attack scheme takes effect. Compared with Tang Mings experimental, which conducted differential power analysis of ZUC with random initial vectors and observing distinct differential power peak with 5000 initial vectors, the proposed attack scheme only uses 256 initial vectors, and gets better results.
-
Key words:
- Cryptography /
- Stream cipher /
- ZUC /
- Power analysis attack /
- Assessment
-
Wu H J, Huang T, Phuong H N, et al.. Differential attacks against stream cipher ZUC[C]. Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, 2012: 262-277. Zhou C F, Feng X T, and Lin D D. The initialization stage analysis of ZUC v1.5[C]. Proceedings of the 10th International Conference, Sanya, China, 2011: 40-53. Gautham S. The stream cipher core of the 3GPP encryption standard 128-EEA3: timing attacks and countermeasures[C]. Proceedings of the 7th International Conference, Beijing, China, 2011: 269-288. L afitte F, M arkowitch O, and Vav Heule D. SAT based analysis of LTE stream cipher ZUC[C]. Proceedings of the 6th International Conference on Security of Information and Networks, Aksavay, Turkey, 2013: 110-116. 關(guān)杰, 丁林, 劉樹凱. SNOW 3G與ZUC流密碼的猜測決定攻擊[J]. 軟件學(xué)報(bào), 2013, 24(6): 1324-1333. Guan Jie, Ding Ling, and Liu Shu-kai. Guess and determine attack on SNOW 3G and ZUC[J]. Journal of Software, 2013, 24(6): 1324-1333. 唐明, 高劍, 孫樂昊, 等. 嵌入式平臺下ZUC算法的側(cè)信道頻域攻擊[J]. 山東大學(xué)學(xué)報(bào)(理學(xué)版), 2014, 49(9): 29-34. Tang Ming, Gao Jian, Sun Le-hao, et al.. Side channel attacks in frequency domain for ZUC algorithm in embedded platform[J]. Journal of Shandong University(Natural Science), 2014, 49(9): 29-34. Reddy E K. Overview of the side channel attacks[J]. Advanced Networking and Applications, 2013, 4(6): 1799-1808. Paul K, Joshua J, Benjamin J, et al.. Introduction to differential power analysis[J]. Journal of Cryptography Engineering, 2011, 1(1): 5-27. 汪鵬君, 張躍軍, 張學(xué)龍. 防御差分功耗分析攻擊技術(shù)研究[J] 電子與信息學(xué)報(bào), 2012, 34(11): 2774-2784. Wang Peng-jun, Zhang Yue-jun, and Zhang Xue-long. Research of differential power analysis countermeasures[J]. Journal of Electronics Information Technology, 2012, 34(11): 2774-2784. 趙永斌, 胡予濮, 賈艷艷. 一種抵抗能量攻擊的線性反饋移位寄存器[J]. 西安電子科技大學(xué)學(xué)報(bào)(自然科學(xué)版), 2013, 40(3): 172-179. Zhao Yong-bin, Hu Yu-pu, and Jia Yan-yan. New design of LFSR based stream ciphers to resist power attack[J]. Journal of Xidian University (Natural Science), 2013, 40(3): 172-179. Kumar S, Lemke K, and Paar C. Some thoughts about implementation properties of stream ciphers[C]. Proceedings of State of the Art of Stream Ciphers Workshop, Brugge, Belgium, 2004: 311-319. Stefan M, Elisabeth O, and Thomas P著. 馮登國, 周永斌, 劉繼業(yè), 等譯. 能量分析攻擊[M]. 北京: 科學(xué)出版社, 2010: 45-46. 金晨輝, 鄭浩然, 張少武, 等. 密碼學(xué)[M]. 北京: 高等教育出版社, 2009: 149-150. Jin Chen-hui, Zheng Hao-ran, Zhang Shao-wu, et al.. Cryptography[M]. Beijing: Higher Education Press, 2009: 149-150. 楊昌盛, 于敬超, 嚴(yán)迎建. Grain-128同步流密碼的選擇初始向量相關(guān)性能量攻擊[J]. 計(jì)算機(jī)應(yīng)用, 2014, 34(5): 1318-1321. Yang Chang-sheng, Yu Jing-chao, and Yan Yin-jian. Chosen initial vector correlation power attack on synchronous stream cipher Grain-128[J]. Journal of Computer Applications, 2014, 34(5): 1318-1321. 劉澤藝, 高能, 屠晨陽, 等. 一種抗能量分析攻擊的復(fù)合寄存器系統(tǒng)[J]. 密碼學(xué)報(bào), 2014, 1(5): 411-421. Liu Ze-yi, Gao Neng, Tu Chen-yang, et al.. A compound register system against power analysis attack[J]. Journal of Cryptologic Research, 2014, 1(5): 411-421. 劉會英, 趙新杰, 王韜, 等. 基于漢明重的SMS4密碼代數(shù)旁路攻擊研究[J]. 計(jì)算機(jī)學(xué)報(bào), 2013, 36(6): 1183-1193. Liu Hui-yin, Zhao Xin-jie, Wang Tao, et al.. Research on hamming weight-based algebraic side-channel attacks on SMS4[J]. Chinese Journal of Computers, 2013, 36(6): 1183-1193. -
計(jì)量
- 文章訪問數(shù): 2235
- HTML全文瀏覽量: 312
- PDF下載量: 870
- 被引次數(shù): 0