首页> 外文期刊>IEEE transactions on information forensics and security >A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
【24h】

A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers

机译:轻量级块密码的代数故障攻击分析与评估框架

获取原文
获取原文并翻译 | 示例
           

摘要

Algebraic fault analysis (AFA), which combines algebraic cryptanalysis with fault attacks, has represented serious threats to the security of lightweight block ciphers. Inspired by an earlier framework for the analysis of side-channel attacks presented at EUROCRYPT 2009, a new generic framework is proposed to analyze and evaluate algebraic fault attacks on lightweight block ciphers. We interpret AFA at three levels: 1) the target; 2) the adversary; and 3) the evaluator. We describe the capability of an adversary in four parts: 1) the fault injector; 2) the fault model describer; 3) the cipher describer; and 4) the machine solver. A formal fault model is provided to cover most of current fault attacks. Different strategies of building optimal equation set are also provided to accelerate the solving process. At the evaluator level, we consider the approximate information metric and the actual security metric. These metrics can be used to guide adversaries, cipher designers, and industrial engineers. To verify the feasibility of the proposed framework, we make a comprehensive study of AFA on an ultra-lightweight block cipher called LBlock. Three scenarios are exploited, which include injecting a fault to encryption, to key scheduling, or modifying the round number or counter. Our best results show that a single fault injection is enough to recover the master key of LBlock within the affordable complexity in each scenario. To verify the generic feature of the proposed framework, we apply AFA to three other block ciphers, i.e., Data Encryption Standard, PRESENT, and Twofish. The results demonstrate that our framework can be used for different ciphers with different structures.
机译:代数故障分析(AFA)将代数密码分析与故障攻击相结合,对轻量级分组密码的安全性构成了严重威胁。受2009年EUROCRYPT提出的用于分析侧信道攻击的早期框架的启发,提出了一个新的通用框架来分析和评估轻量级分组密码的代数故障攻击。我们从三个层面来解释AFA:1)目标; 2)对手; 3)评估者。我们从四个部分描述对手的能力:1)故障注入器; 2)故障模型描述器; 3)密码描述者;和4)机器求解器。提供了一个正式的故障模型以涵盖当前的大多数故障攻击。还提供了构建最佳方程组的不同策略,以加快求解过程。在评估者级别,我们考虑近似信息度量和实际安全度量。这些指标可用于指导对手,密码设计者和工业工程师。为了验证所提出框架的可行性,我们对称为LBlock的超轻量级分组密码进行了AFA的全面研究。利用了三种方案,其中包括向加密注入错误,密钥调度或修改轮数或计数器。我们的最佳结果表明,在每种情况下,一次故障注入就足以在负担得起的复杂度内恢复LBlock的主密钥。为了验证所提出框架的通用功能,我们将AFA应用于其他三个分组密码,即数据加密标准,PRESENT和Twofish。结果表明,我们的框架可用于具有不同结构的不同密码。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号