首页 | 本学科首页   官方微博 | 高级检索  
   检索      

DES密码旁路立方体分析
引用本文:刘会英,王韬,郭世泽,赵新杰.DES密码旁路立方体分析[J].军械工程学院学报,2013(3):64-69.
作者姓名:刘会英  王韬  郭世泽  赵新杰
作者单位:军械工程学院信息工程系,河北石家庄050003
基金项目:国家自然科学基金项目(61173191)
摘    要:将立方体分析和旁路攻击结合,基于8位汉明重泄露模型,首次对DES分组密码抗旁路立方体攻击安全性进行了评估.在黑盒攻击场景下,攻击者首先按照一定规则生成立方体和超多项式,然后利用不同选择明文,计算其在加密过程某比特的高阶差分,判断该立方体对应的超多项式是否合法.对DES加密输出第l轮输出不同字节进行了黑盒旁路立方体攻击实验,结果表明:未经防护的DES密码易遭黑盒旁路立方体攻击;如果攻击者能够精确获取加密第1轮输出某一字节的汉明重泄露,最好的攻击结果为2^9.35个选择明文可将DES主密钥搜索空间降至2^15.

关 键 词:旁路立方体攻击  黑盒攻击  汉明重泄露  DES  分组密码

Side Channel Cube Attacks on DES
LIU Hui-ying,WANG Tao,GUO Shi-ze,ZHAO Xin-jie.Side Channel Cube Attacks on DES[J].Journal of Ordnance Engineering College,2013(3):64-69.
Authors:LIU Hui-ying  WANG Tao  GUO Shi-ze  ZHAO Xin-jie
Institution:(Computer Engineering Department,Ordnance Engineering College,Shijiazhuang 050003,China)
Abstract:In this paper ,we investigate the security of DES block cipher against side-channel cube attacks based on 8-bit Hamming weight leakage model. Under the black-attack scenario, the adversary firstly generates random cube and superpoly. Then the cube is used to generate chosen plaintexts. The adversary deduces one bit of the intermediate state from the side channel attack for each chosen plaintext and computes the high order differences of these one bit values to verify the relations between the cube and superpoly. Simulation experiments are launched on output of first round of DES. The results demonstrate that the unprotected implementation of DES is vulnerahle to side-channel cube attacks. If the adversary can accurately deduce the Hamming weight of the intermediate states from the side-channel leakages, many cubes and superpolys can be extracted and used for key recovery. The best experiment result is 2^9.35 chosen plaintexts, which can reduce the DES master keysearch space to 2^15.
Keywords:side-channel cube attack  black-box attack  Hamming weight  DES  block cipher
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号