一種NoisyRounds保護的白盒AES實現(xiàn)及其差分故障分析
發(fā)布時間:2021-02-04 12:22
差分故障分析(differential fault analysis, DFA)是一種通過對密碼算法中間狀態(tài)注入錯誤從而獲取密鑰信息的側(cè)信道攻擊方法.由Bos等人創(chuàng)造性的用于白盒分組密碼方案并成功破解多個公開發(fā)表的白盒AES實現(xiàn).本文基于隨機冗余輪函數(shù)(DummyRounds)和Chow等人的AES白盒實現(xiàn)(以下簡稱Chow-WBAES),提出一種稱為NoisyRounds的白盒AES安全加固方案(以下簡稱NoisyRoundsWBAES).該方案通過改變Chow-WBAES的第10輪并在其后添加相互抵消的結(jié)構(gòu),使得NoisyRoundsWBAES能對DFA分析產(chǎn)生混淆作用.通過NoisyRounds-WBAES與Chow-WBAES實施DFA攻擊的分析結(jié)果表明,在帶外部編碼的情況下, NoisyRounds與現(xiàn)有保護方案一樣能抵抗DFA工具的分析.但相應(yīng)的算法的輸出結(jié)果也將帶上外部編碼,從而失去不同系統(tǒng)間的兼容性,在不帶外部編碼的情況下, n組NoisyRounds對DFA分析將產(chǎn)生O(n4)的計算復(fù)雜度.
【文章來源】:密碼學(xué)報. 2020,7(03)
【文章頁數(shù)】:16 頁
【部分圖文】:
錯誤密文對占比情況與NoisyRounds組數(shù)關(guān)系圖
孫濤等:一種NoisyRounds保護的白盒AES實現(xiàn)及其差分故障分析355圖5遍歷子密鑰次數(shù)和存儲開銷與n的變化關(guān)系圖Figure5Relationbetweennumberofexhaustivesearchandstoragecost升Chow類型白盒AES的抗DFA分析能力具有參考意義.未來我們將嘗試肖雅瑩和來學(xué)嘉提出的16比特的內(nèi)部編碼的白盒AES方案的DFA分析和進一步研究NoisyRounds技術(shù)對基于仿射變換的白盒SM4實現(xiàn)的抗DFA保護方案.參考文獻[1]LIJR,LINZQ,CABALLEROJ,etal.K-hunt:Pinpointinginsecurecryptographickeysfromexecutiontraces[C].In:Proceedingsofthe2018ACMSIGSACConferenceonComputerandCommunicationsSecurity(CCS2018),ACM,2018:412–425.[DOI:10.1145/3243734.3243783][2]CHOWS,EISENPA,JOHNSONH,etal.White-boxcryptographyandanAESimplementation[C].In:SelectedAreasinCryptography—SAC2002.SpringerBerlinHeidelberg,2003:250–270.[DOI:10.1007/3-540-36492-7_17][3]CHOWS,EISENPA,JOHNSONH,etal.Awhite-boxDESimplementationforDRMapplications[C].In:DigitalRightsManagement—DRM2002.SpringerBerlinHeidelberg,2002:1–15.[DOI:10.1007/978-3-540-44993-5_1][4]BILLETO,GILBERTH,ECH-CHATBIC.CryptanalysisofawhiteboxAESimplementation[C].In:SelectedAreasinCryptography—SAC2004.SpringerBerlinHeidelberg,2004:227–240.[DOI:10.1007/978-3-540-30564-4_16][5]WYSEURB,MICHIELSW,GORISSENP,etal.Cryptanalysisofwhite-boxDESimplementationswitharbitraryexternalencodings[J].IACRCryptologyePrintArchive,2007:2007/104.https://eprint.iacr.org/2007/104[6]BRINGERJ,CHABANNEH,DOTTAXE.Whiteboxcryptography:Anotherattempt[J].IACRCryptologyePrintArchive,2006:2
【參考文獻】:
期刊論文
[1]Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography[J]. Yongjin YEOM,Dong-Chan KIM,Chung Hun BAEK,Junbum SHIN. Science China(Information Sciences). 2020(03)
[2]Protecting white-box cryptographic implementations with obfuscated round boundaries[J]. Tao XU,Chuankun WU,Feng LIU,Ruoxin ZHAO. Science China(Information Sciences). 2018(03)
本文編號:3018300
【文章來源】:密碼學(xué)報. 2020,7(03)
【文章頁數(shù)】:16 頁
【部分圖文】:
錯誤密文對占比情況與NoisyRounds組數(shù)關(guān)系圖
孫濤等:一種NoisyRounds保護的白盒AES實現(xiàn)及其差分故障分析355圖5遍歷子密鑰次數(shù)和存儲開銷與n的變化關(guān)系圖Figure5Relationbetweennumberofexhaustivesearchandstoragecost升Chow類型白盒AES的抗DFA分析能力具有參考意義.未來我們將嘗試肖雅瑩和來學(xué)嘉提出的16比特的內(nèi)部編碼的白盒AES方案的DFA分析和進一步研究NoisyRounds技術(shù)對基于仿射變換的白盒SM4實現(xiàn)的抗DFA保護方案.參考文獻[1]LIJR,LINZQ,CABALLEROJ,etal.K-hunt:Pinpointinginsecurecryptographickeysfromexecutiontraces[C].In:Proceedingsofthe2018ACMSIGSACConferenceonComputerandCommunicationsSecurity(CCS2018),ACM,2018:412–425.[DOI:10.1145/3243734.3243783][2]CHOWS,EISENPA,JOHNSONH,etal.White-boxcryptographyandanAESimplementation[C].In:SelectedAreasinCryptography—SAC2002.SpringerBerlinHeidelberg,2003:250–270.[DOI:10.1007/3-540-36492-7_17][3]CHOWS,EISENPA,JOHNSONH,etal.Awhite-boxDESimplementationforDRMapplications[C].In:DigitalRightsManagement—DRM2002.SpringerBerlinHeidelberg,2002:1–15.[DOI:10.1007/978-3-540-44993-5_1][4]BILLETO,GILBERTH,ECH-CHATBIC.CryptanalysisofawhiteboxAESimplementation[C].In:SelectedAreasinCryptography—SAC2004.SpringerBerlinHeidelberg,2004:227–240.[DOI:10.1007/978-3-540-30564-4_16][5]WYSEURB,MICHIELSW,GORISSENP,etal.Cryptanalysisofwhite-boxDESimplementationswitharbitraryexternalencodings[J].IACRCryptologyePrintArchive,2007:2007/104.https://eprint.iacr.org/2007/104[6]BRINGERJ,CHABANNEH,DOTTAXE.Whiteboxcryptography:Anotherattempt[J].IACRCryptologyePrintArchive,2006:2
【參考文獻】:
期刊論文
[1]Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography[J]. Yongjin YEOM,Dong-Chan KIM,Chung Hun BAEK,Junbum SHIN. Science China(Information Sciences). 2020(03)
[2]Protecting white-box cryptographic implementations with obfuscated round boundaries[J]. Tao XU,Chuankun WU,Feng LIU,Ruoxin ZHAO. Science China(Information Sciences). 2018(03)
本文編號:3018300
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/3018300.html
最近更新
教材專著