若干對(duì)稱(chēng)密碼算法的安全性分析
發(fā)布時(shí)間:2019-05-12 14:36
【摘要】:在信息技術(shù)日新月異的互聯(lián)網(wǎng)時(shí)代,信息安全問(wèn)題變得日益突出。作為信息安全的理論核心,密碼學(xué)為數(shù)據(jù)的安全傳送提供基本保障。現(xiàn)代密碼學(xué)的密碼體制通常分為兩類(lèi):對(duì)稱(chēng)密碼體制和非對(duì)稱(chēng)密碼體制,其中對(duì)稱(chēng)密碼是密碼學(xué)研究的核心內(nèi)容之一。對(duì)稱(chēng)密碼主要包括分組密碼、Hash函數(shù)和流密碼,并且對(duì)稱(chēng)密碼算法具有運(yùn)行速度快,存儲(chǔ)量小以及易于軟硬件實(shí)現(xiàn)等優(yōu)點(diǎn)。分組密碼作為對(duì)稱(chēng)密碼的重要分支,廣泛地應(yīng)用于許多領(lǐng)域,,如文件傳輸、網(wǎng)絡(luò)通信和數(shù)據(jù)庫(kù)系統(tǒng)安全等。Hash函數(shù)作為對(duì)稱(chēng)密碼的另一個(gè)重要組成部分,在數(shù)字簽名、文件完整性和身份認(rèn)證等領(lǐng)域有著廣泛的應(yīng)用。 隨著智能硬件和嵌入式技術(shù)的飛速發(fā)展,以及密碼設(shè)備的大規(guī)模應(yīng)用,從密碼算法的數(shù)學(xué)結(jié)構(gòu)上研究算法的安全性已經(jīng)遠(yuǎn)遠(yuǎn)不夠,而需從密碼算法的具體實(shí)現(xiàn)分析算法的安全性。在這種背景下側(cè)信道攻擊應(yīng)運(yùn)而生,它利用密碼設(shè)備計(jì)算過(guò)程中出現(xiàn)的軟、硬件故障信息及相關(guān)輸出可快速地恢復(fù)出密鑰或者明文。差分故障攻擊作為一種有效的側(cè)信道攻擊,是指通過(guò)對(duì)密碼設(shè)備誘導(dǎo)故障并結(jié)合差分分析技術(shù)的密碼分析方法。差分故障攻擊憑借其攻擊能力強(qiáng),速度快且易實(shí)現(xiàn)等特點(diǎn),已引起國(guó)內(nèi)外研究學(xué)者的廣泛關(guān)注。 本文主要針對(duì)Serpent算法、GOST算法和MD5算法壓縮函數(shù)提出了有效的差分故障攻擊方法,并進(jìn)行了軟件模擬。同時(shí),本文也針對(duì)MD4算法提出了有效的故障檢測(cè)方法。本文的創(chuàng)新性研究成果有: 首先,在面向單字節(jié)的隨機(jī)故障模型和差分技術(shù)的基礎(chǔ)上,提出了針對(duì)Serpent密碼的有效差分故障攻擊方法。數(shù)學(xué)分析和實(shí)驗(yàn)結(jié)果表明僅需要48個(gè)故障密文即可恢復(fù)Serpent密碼的128位原始密鑰。該方法也為同類(lèi)型的其他迭代密碼的差分故障攻擊提供了一種較通用的分析手段。 其次,依據(jù)面向單字節(jié)的隨機(jī)故障模型和差分技術(shù),提出了對(duì)GOST密碼的差分故障攻擊方法。實(shí)驗(yàn)結(jié)果表明僅需要32個(gè)故障密文即可恢復(fù)GOST密碼的256比特原始密鑰。本文提出的方法不僅擴(kuò)大了故障攻擊的范圍,而且還提高了故障導(dǎo)入效率,降低了所需的故障密文數(shù)。 然后,根據(jù)面向字的隨機(jī)故障模型和差分技術(shù),提出了對(duì)MD5算法壓縮函數(shù)的差分故障攻擊方法。實(shí)驗(yàn)結(jié)果表明僅需要導(dǎo)入144個(gè)故障即可恢復(fù)出MD5算法的當(dāng)前輸入消息塊。該方法也為其它類(lèi)似MD5結(jié)構(gòu)的Hash函數(shù)的安全性分析提供了新的分析手段。 最后,依據(jù)差分故障攻擊原理,提出了MD4算法抵御差分故障攻擊的檢測(cè)方法。通過(guò)該檢測(cè)方法可以判斷當(dāng)前的MD4算法是否受到差分故障攻擊,并確定故障導(dǎo)入位置,以及分辨導(dǎo)入的故障是否為有效故障。該檢測(cè)方法對(duì)于其他的密碼算法抵御差分故障攻擊的研究具有重要的參考價(jià)值。
[Abstract]:In the Internet era with the rapid development of information technology, the problem of information security has become increasingly prominent. As the theoretical core of information security, cryptography provides the basic guarantee for the secure transmission of data. The cryptography of modern cryptography is usually divided into two categories: symmetric cryptography and asymmetric cryptography, in which symmetric cryptography is one of the core contents of cryptography research. Symmetric ciphers mainly include block ciphers, Hash functions and stream ciphers, and symmetric cryptography algorithms have the advantages of fast running speed, small storage and easy implementation of software and hardware. Block cipher, as an important branch of symmetric cipher, is widely used in many fields, such as file transfer, network communication and database system security. Hash function, as another important part of symmetric cipher, is used in digital signature. File integrity and identity authentication have a wide range of applications. With the rapid development of intelligent hardware and embedded technology, as well as the large-scale application of cryptography devices, it is far from enough to study the security of the algorithm from the mathematical structure of the cryptography algorithm. It is necessary to analyze the security of the algorithm from the specific implementation of the cryptography algorithm. In this context, the side channel attack emerges as the times require, which can quickly recover the key or clear text by using the software and hardware fault information and related output in the process of cryptography computing. As an effective side channel attack, differential fault attack refers to the cryptanalysis method which leads to the fault of cryptography equipment and combines the differential analysis technology. Differential fault attack has attracted extensive attention of scholars at home and abroad because of its strong attack ability, fast speed and easy implementation. In this paper, an effective differential fault attack method is proposed for Serpent algorithm, GOST algorithm and MD5 algorithm compression function, and the software simulation is carried out. At the same time, an effective fault detection method for MD4 algorithm is proposed in this paper. The innovative research results of this paper are as follows: firstly, based on the single byte-oriented stochastic fault model and differential technique, an effective differential fault attack method for Serpent cryptography is proposed. The mathematical analysis and experimental results show that only 48 fault ciphers are needed to recover the 128bit original key of Serpent password. This method also provides a general analysis method for differential fault attacks of other iterative ciphers of the same type. Secondly, based on the single byte-oriented stochastic fault model and differential technique, a differential fault attack method for GOST cryptography is proposed. The experimental results show that only 32 fault ciphertext is needed to recover the 256bit original key of the GOST password. The method proposed in this paper not only expands the scope of fault attack, but also improves the efficiency of fault import and reduces the number of fault ciphertext required. Then, according to the word-oriented stochastic fault model and differential technique, a differential fault attack method for compression function of MD5 algorithm is proposed. The experimental results show that only 144 faults can be imported to recover the current input message block of MD5 algorithm. This method also provides a new method for the security analysis of other Hash functions similar to MD5 structure. Finally, according to the principle of differential fault attack, a detection method of MD4 algorithm against differential fault attack is proposed. The detection method can be used to determine whether the current MD4 algorithm is attacked by differential fault, and to determine the location of fault import, and to distinguish whether the imported fault is an effective fault or not. This detection method has important reference value for other cryptography algorithms to resist differential fault attacks.
【學(xué)位授予單位】:東華大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2015
【分類(lèi)號(hào)】:TP309
本文編號(hào):2475460
[Abstract]:In the Internet era with the rapid development of information technology, the problem of information security has become increasingly prominent. As the theoretical core of information security, cryptography provides the basic guarantee for the secure transmission of data. The cryptography of modern cryptography is usually divided into two categories: symmetric cryptography and asymmetric cryptography, in which symmetric cryptography is one of the core contents of cryptography research. Symmetric ciphers mainly include block ciphers, Hash functions and stream ciphers, and symmetric cryptography algorithms have the advantages of fast running speed, small storage and easy implementation of software and hardware. Block cipher, as an important branch of symmetric cipher, is widely used in many fields, such as file transfer, network communication and database system security. Hash function, as another important part of symmetric cipher, is used in digital signature. File integrity and identity authentication have a wide range of applications. With the rapid development of intelligent hardware and embedded technology, as well as the large-scale application of cryptography devices, it is far from enough to study the security of the algorithm from the mathematical structure of the cryptography algorithm. It is necessary to analyze the security of the algorithm from the specific implementation of the cryptography algorithm. In this context, the side channel attack emerges as the times require, which can quickly recover the key or clear text by using the software and hardware fault information and related output in the process of cryptography computing. As an effective side channel attack, differential fault attack refers to the cryptanalysis method which leads to the fault of cryptography equipment and combines the differential analysis technology. Differential fault attack has attracted extensive attention of scholars at home and abroad because of its strong attack ability, fast speed and easy implementation. In this paper, an effective differential fault attack method is proposed for Serpent algorithm, GOST algorithm and MD5 algorithm compression function, and the software simulation is carried out. At the same time, an effective fault detection method for MD4 algorithm is proposed in this paper. The innovative research results of this paper are as follows: firstly, based on the single byte-oriented stochastic fault model and differential technique, an effective differential fault attack method for Serpent cryptography is proposed. The mathematical analysis and experimental results show that only 48 fault ciphers are needed to recover the 128bit original key of Serpent password. This method also provides a general analysis method for differential fault attacks of other iterative ciphers of the same type. Secondly, based on the single byte-oriented stochastic fault model and differential technique, a differential fault attack method for GOST cryptography is proposed. The experimental results show that only 32 fault ciphertext is needed to recover the 256bit original key of the GOST password. The method proposed in this paper not only expands the scope of fault attack, but also improves the efficiency of fault import and reduces the number of fault ciphertext required. Then, according to the word-oriented stochastic fault model and differential technique, a differential fault attack method for compression function of MD5 algorithm is proposed. The experimental results show that only 144 faults can be imported to recover the current input message block of MD5 algorithm. This method also provides a new method for the security analysis of other Hash functions similar to MD5 structure. Finally, according to the principle of differential fault attack, a detection method of MD4 algorithm against differential fault attack is proposed. The detection method can be used to determine whether the current MD4 algorithm is attacked by differential fault, and to determine the location of fault import, and to distinguish whether the imported fault is an effective fault or not. This detection method has important reference value for other cryptography algorithms to resist differential fault attacks.
【學(xué)位授予單位】:東華大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2015
【分類(lèi)號(hào)】:TP309
【參考文獻(xiàn)】
相關(guān)期刊論文 前3條
1 張蕾;吳文玲;;SMS4密碼算法的差分故障攻擊[J];計(jì)算機(jī)學(xué)報(bào);2006年09期
2 李瑋;谷大武;;基于密鑰編排故障的SMS4算法的差分故障分析[J];通信學(xué)報(bào);2008年10期
3 韓軍;曾曉洋;趙佳;;抗差分功耗分析和差分故障分析的AES算法VLSI設(shè)計(jì)與實(shí)現(xiàn)[J];通信學(xué)報(bào);2010年01期
本文編號(hào):2475460
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2475460.html
最近更新
教材專(zhuān)著