轻量级GIFT算法的能量分析攻击
首发时间:2020-01-14
摘要:GIFT算法是一个新的轻量级分组密码算法,成为当前最节能的密码算法之一。然而,尽管其在硬件实现的安全性得到了广泛的研究,其在软件上的安全隐患仍不能被忽略。基于此,本文对GIFT算法进行了能量分析攻击以验证其安全性。本文选择对构建泄露模型要求较少的互信息分析,以及对供给曲线需求较少的模板分析来模拟攻击者在不同攻击条件下可能展开的攻击方式,并对直接软件实现的GIFT算法展开了攻击。实验证明,原始GIFT算法在软件实现时,极易受到能量分析攻击的威胁。特别地,在基于模板分析的攻击下,攻击者仅需要9条供给曲线即可恢复密钥。
关键词: 密码学 侧信道攻击 GIFT算法 模板攻击 互信息分析
For information in English, please click here
Power Analysis Attack on GIFT
Abstract:GIFT is a new lightweight block cipher algorithm, which has become one of the most energy-efficient cipher algorithms at present. While its hardware implementation has been extensively studied, little effort has been made to analysis the security risks of its software. In this paper, power analysis have been used to verify its security. This paper select mutual information analysis which has less requirements for create leakage models, and template analysis which only needs few power traces for attack to simulate how attackers may use under different attack conditions. Experiments show that the original GIFT is vulnerable to power analysis attack when implemented in software. In particular, under the attack based on template analysis, only 9 traces needs be used by the attacker to obtain the key.
Keywords: Cryptography side-channel analysis GIFT template analysis mutual information analysis
基金:
引用
No.****
动态公开评议
共计0人参与
勘误表
轻量级GIFT算法的能量分析攻击
评论
全部评论0/1000