首页> 外文期刊>Constraints >Side-channel cryptographic attacks using pseudo-boolean optimization
【24h】

Side-channel cryptographic attacks using pseudo-boolean optimization

机译:使用伪布尔优化的边信道加密攻击

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Symmetric block ciphers, such as the Advanced Encryption Standard (AES), are deterministic algorithms which transform plaintexts to ciphertexts using a secret key. These ciphers are designed such that it is computationally very difficult to recover the secret key if only pairs of plaintexts and ciphertexts are provided to the attacker. Constraint solvers have recently been suggested as a way of recovering the secret keys of symmetric block ciphers. To carry out such an attack, the attacker provides the solver with a set of equations describing the mathematical relationship between a known plaintext and a known ciphertext, and then attempts to solve for the unknown secret key. This approach is known to be intractable against AES unless side-channel data - information leaked from the cryptographic device due to its internal physical structure - is introduced into the equation set. A significant challenge in writing equations representing side-channel data is measurement noise. In this work we show how casting the problem as a pseudo-Boolean optimization instance provides an efficient and effective way of tolerating this noise. We describe a theoretical analysis, connecting the measurement signal-to-noise ratio and the tolerable set size of a non-optimizing solver with the success probability. We then conduct an extensive performance evaluation, comparing two optimizing variants for dealing with measurement noise to a non-optimizing method. Our best optimizing method provides a successful attack on the AES cipher which requires surprisingly little side-channel data and works in reasonable computation time. We also make available a set of AES cryptanalysis instances and provide some practical feedback on our experience of using open-source constraint solvers.
机译:对称块密码,例如高级加密标准(AES),是确定性算法,可使用密钥将明文转换为密文。这些密码的设计使得,如果仅将成对的明文和密文提供给攻击者,则在计算上很难恢复密钥。最近已经提出了约束求解器,作为恢复对称分组密码的秘密密钥的一种方法。为了进行这种攻击,攻击者向求解器提供了一组描述已知明文和已知密文之间的数学关系的方程,然后尝试求解未知密钥。除非将旁通道数据(由于其内部物理结构而从加密设备泄漏的信息)引入等式集,否则这种方法对于AES是难以解决的。在编写表示侧信道数据的方程式时的一个重大挑战是测量噪声。在这项工作中,我们展示了如何将问题强制转换为伪布尔优化实例,从而提供一种有效且有效的方式来容忍这种噪声。我们描述了一种理论分析,将测量信号的信噪比和非优化求解器的可容许集合大小与成功概率联系起来。然后,我们进行了广泛的性能评估,将用于处理测量噪声的两个优化变量与非优化方法进行了比较。我们最好的优化方法是对AES密码的成功攻击,该密码需要令人惊讶的很少的边信道数据,并且可以在合理的计算时间内工作。我们还提供了一组AES密码分析实例,并就我们使用开源约束求解器的经验提供了一些实用的反馈。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号