首页> 外文会议>International Conference on Information and Communications Security >Consecutive S-box Lookups: A Timing Attack on SNOW 3G
【24h】

Consecutive S-box Lookups: A Timing Attack on SNOW 3G

机译:连续的S-Box查找:在雪3G上进行定时攻击

获取原文

摘要

We present a cache-timing attack on the SNOW 3G stream cipher. The attack has extremely low complexity and we show it is capable of recovering the full cipher state from empirical timing data in a matter of seconds, requiring no known keystream and only observation of a small number of cipher clocks. The attack exploits the cipher using the output from an S-box as input to another S-box: we show that the corresponding cache-timing data almost uniquely determines said S-box input. We mention other ciphers with similar structure where this attack applies, such as the K2 cipher currently under standardization consideration by ISO. Our results yield new insights into the secure design and implementation of ciphers with respect to side-channels. We also give results of a bit-slice implementation as a counter measure.
机译:我们在雪3G流密码上呈现了缓存定时攻击。该攻击具有极低的复杂性,并且我们表示能够在几秒钟内从经验时序数据恢复全密码状态,不需要已知的键盘,并且仅观察少量密码时钟。该攻击利用来自S-Box的输出作为另一个S-Box的输出利用CIPT输出:我们显示相应的缓存定时数据几乎唯一地确定所述S盒输入。我们提到具有类似结构的其他密码,此次攻击适用,例如ISO标准化考虑的K2密码。我们的结果为侧视通道提供了对安全设计和实现的新见解。我们还将比特切片实现的结果作为计数器措施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号