首页> 外文会议>Topics in cryptology - CT-RSA 2007 >Differential Power Analysis of Stream Ciphers
【24h】

Differential Power Analysis of Stream Ciphers

机译:流密码的微分功率分析

获取原文
获取原文并翻译 | 示例

摘要

Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream ciphers. The few existing references mainly treat timing [8] and template attacks [10], or provide a theoretical analysis [6], [7] of weaknesses of stream cipher constructions. In this paper we present attacks on two focus candidates, Trivium and Grain, of the eSTREAM stream cipher project. The attacks exploit the resynchronization phase of ciphers. A novel concept for choosing initial value vectors is introduced, which totally eliminates the algorithmic noise of the device, leaving only the pure side-channel signal. This attack allows to recover the secret key with a small number of samples and without building templates. To prove the concept we apply the attack to hardware implementations of the ciphers. For both stream ciphers we are able to reveal the complete key.
机译:广泛讨论了对分组密码和公共密钥算法的边信道攻击。但是,关于流密码的侧道攻击的文献很少。现有的一些参考文献主要讨论定时[8]和模板攻击[10],或者提供关于流密码构造的弱点的理论分析[6],[7]。在本文中,我们介绍了对eSTREAM流密码项目的两个重点候选对象Trivium和Grain的攻击。攻击利用密码的重新同步阶段。介绍了一种用于选择初始值向量的新颖概念,该概念完全消除了设备的算法噪声,仅留下纯净的旁通道信号。这种攻击允许使用少量样本并且无需构建模板即可恢复密钥。为了证明这一概念,我们将攻击应用于密码的硬件实现。对于这两种流密码,我们都可以显示完整密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号