首页> 外文会议>Inscrypt 2012 >Improved Differential Cache Attacks on SMS4
【24h】

Improved Differential Cache Attacks on SMS4

机译:改进SMS4上的差分缓存攻击

获取原文

摘要

Block ciphers that have Feistel structures are prone to a class of cache attacks known as differential cache attacks, which monitor power or timing side-channels to reveal the secret key. Differential cache attacks were first demonstrated on the block cipher CLEFIA, which has a type-2 generalized Feistel structure. In this paper we improve the attack methodology by showing that a sophisticated method of choosing plaintexts can result in a considerable reduction in attack complexity. This coupled with other cryptanalytic techniques, when applied to the block cipher SMS4, requires just 210 plaintexts to recover the SMS4 secret key from power traces for a 64 byte cache line. Further, the attack becomes more dangerous for large cache lines. For example, with a 128 byte cache line, only 52 power traces are required. Experimental validation of the complete attack has been done on an Intel Xeon microprocessor. Further we suggest an alteration to the SMS4 algorithm that can counter this attack.
机译:具有Feistel结构的块密码容易出现一类称为差分缓存攻击的高速缓存攻击,该攻击是监控电源或定时侧通道以显示秘密密钥。首先在块密码谱图上展示差分缓存攻击,该块CLEFIA具有Type-2广义的Feistel结构。在本文中,我们通过表明选择明文的复杂方法可能导致攻击复杂性显着降低,改善攻击方法。当应用于块密码SMS4时,它与其他密码技术耦合,需要210明文,从电源跟踪中恢复SMS4秘密密钥,以获得64字节高速缓存行。此外,对大型缓存行变得更危险。例如,对于128字节高速缓存行,只需要52个电力迹线。在英特尔Xeon微处理器上完成了完整攻击的实验验证。此外,我们建议更改可以对抗这种攻击的SMS4算法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号