首页> 外文会议>Design, Automation and Test in Europe Conference and Exhibition >GRINCH: A Cache Attack against GIFT Lightweight Cipher
【24h】

GRINCH: A Cache Attack against GIFT Lightweight Cipher

机译:GRINCH:对礼品轻质密码的缓存攻击

获取原文

摘要

The National Institute of Standard and Technology (NIST) has recently started a competition with the objective to standardize lightweight cryptography (LWC). The winning schemes will be deployed in Internet-of-Things (IoT) devices, a key step for the current and future information and communication technology market. GIFT is an efficient lightweight cipher and it is used by one-fourth of the LWC candidates in the NIST LWC competition. Thus, its security evaluation is critical. One vital threat to the security are so-called logical side-channel attacks based on cache observations. In this work, we propose a novel cache attack on GIFT referred to as GRINCH. We analyzed the vulnerabilities of GIFT and exploited them in our attack. The results show that the attack is effective and that the full key could be recovered with less than 400 encryptions.
机译:国家标准和技术研究所(NIST)最近开始竞争,目标是标准化轻量级密码学(LWC)。 获奖计划将部署在物联网(物联网)设备中,是当前和未来信息和通信技术市场的关键步骤。 礼物是一个有效的轻质密码,它是NIST LWC竞赛中的LWC候选人的四分之一。 因此,其安全评估至关重要。 对安全性的一个至关重要的威胁是基于缓存观测的所谓的逻辑侧通道攻击。 在这项工作中,我们提出了一种关于GRINCH的礼物的新型缓存攻击。 我们分析了礼物的脆弱性,并在我们的攻击中利用了他们。 结果表明,攻击是有效的,并且可以使用少于400个加密恢复全部键。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号