【24h】

How Secure is AES Under Leakage

机译:AES在泄漏下的安全性如何

获取原文
获取外文期刊封面目录资料

摘要

While traditionally cryptographic algorithms have been designed with the black-box security in mind, they often have to deal with a much stronger adversary - namely, an attacker that has some access to the execution environment of a cryptographic algorithm. This can happen in such grey-box settings as physical side-channel attacks or digital forensics as well as due to Trojans. In this paper, we aim to address this challenge for symmetric-key cryptography. We study the security of the Advanced Encryption Standard (AES) in the presence of explicit leakage: We let a part of the internal secret state leak in each operation. We consider a wide spectrum of settings - from adversaries with limited control all the way to the more powerful attacks with more knowledge of the computational platform. To mount key recoveries under leakage, we develop several novel cryptanalytic techniques such as differential bias attacks. Moreover, we demonstrate and quantify the effect of uncertainty and implementation countermeasures under such attacks: black-boxed rounds, space randomization, time randomization, and dummy operations. We observe that the residual security of AES can be considerable, especially with uncertainty and basic countermeasures in place.
机译:尽管传统上设计密码算法时要考虑到黑盒安全性,但它们通常不得不与更强大的对手打交道,即,攻击者可以一定程度地访问密码算法的执行环境。这可能发生在诸如物理边信道攻击或数字取证这样的灰箱设置中,也可能是由于特洛伊木马程序造成的。在本文中,我们旨在解决对称密钥密码术的这一挑战。我们在存在显式泄漏的情况下研究高级加密标准(AES)的安全性:我们在每次操作中让部分内部秘密状态泄漏。我们考虑的设置范围很广-从控制有限的对手一直到对计算平台有更多了解的更强大的攻击。为了在泄漏下安装关键恢复,我们开发了几种新颖的密码分析技术,例如差分偏差攻击。此外,我们演示并量化了在以下攻击下不确定性和实施对策的影响:黑匣子回合,空间随机化,时间随机化和虚拟操作。我们注意到,AES的剩余安全性可能相当可观,尤其是在存在不确定性和基本对策的情况下。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号