首页> 外文期刊>Journal of cryptographic engineering >Scan-based side channel attack on stream ciphers and its prevention
【24h】

Scan-based side channel attack on stream ciphers and its prevention

机译:基于扫描的流密码侧信道攻击及其防范

获取原文
获取原文并翻译 | 示例
           

摘要

Scan chains, a design for testability feature, are included in most modern-day ICs. But, it opens a side channel for attacking cryptographic chips. We propose a methodology by which we can recover internal states of any stream cipher using scan chains. We consider conventional scan chain design which is normally not scrambled or protected in any other way. In this scenario, the challenge of the adversary is to obtain the correspondence of output of the scan chain and the internal state registers of the stream cipher. We present a mathematical model of the attack and the correspondence between the scan chain-outputs and the internal state bits have been proved under this model. We propose an algorithm that through offline and online simulation forms bijection between the above-mentioned sets and thus finds the required correspondence. We also give an estimate of the number of offline simulations necessary for finding the correspondence. The proposed strategy is successfully applied to eStream hardware based winners MICKEY-128 2.0, Trivium and Grain-128.
机译:扫描链是一种可测试性设计,已包含在大多数现代IC中。但是,它为攻击加密芯片打开了一条旁道。我们提出了一种方法,通过该方法可以使用扫描链恢复任何流密码的内部状态。我们考虑通常不会以任何其他方式加扰或保护的常规扫描链设计。在这种情况下,对手的挑战是获取扫描链的输出与流密码的内部状态寄存器的对应关系。我们提出了攻击的数学模型,并在该模型下证明了扫描链输出与内部状态位之间的对应关系。我们提出了一种算法,该算法通过离线和在线模拟在上述集合之间形成双射,从而找到所需的对应关系。我们还估计了找到对应关系所需的离线模拟的数量。所提出的策略已成功应用于基于eStream硬件的获奖者MICKEY-128 2.0,Trivium和Grain-128。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号