立方攻击研究综述 - 计算机应用研究 编辑部 - 《计算机应用研究》唯一官方网站

《计算机应用研究》|Application Research of Computers

立方攻击研究综述

Survey of cube attack

免费全文下载 (已被下载 次)  
获取PDF全文
作者 马云飞,王韬,陈浩,黄长阳
机构 军械工程学院 信息工程系,石家庄 050003
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2018)08-2245-06
DOI 10.3969/j.issn.1001-3695.2018.08.002
摘要 立方攻击是一种基于高阶差分理论的新型代数攻击方法,只要输出比特能够表示成关于明文变量和密钥变量的低次多元方程,立方攻击就有可能攻破此类密码。近年来立方攻击研究迅速开展,取得了一系列重要的成果。首先介绍了立方攻击原理及其变种:非线性立方攻击、立方测试和动态立方攻击;总结了基于中间状态泄露和基于故障信息泄露的两种旁路立方攻击模型及容错机制,给出了立方攻击扩展研究内容;最后分析了已有研究的不足并预测了下一步可能的研究方向。
关键词 高阶差分;代数攻击;立方攻击;旁路立方攻击
基金项目 国家自然科学基金资助项目(61272491,61309021)
本文URL http://www.arocmag.com/article/01-2018-08-002.html
英文标题 Survey of cube attack
作者英文名 Ma Yunfei, Wang Tao, Chen Hao, Huang Changyang
机构英文名 Dept.ofInformationEngineering,OrdnanceEngineeringCollege,Shijiazhuang050003,China
英文摘要 The cube attack is a new type of algebraic attack based on higher-order difference theory. Cube attack could break any cipher if the output-bits could be represented as low-degree multivariate polynomials of public and secret variables. The research on cube attack was carried out rapidly and achieved a series of outcomes in recent years. This paper introduced the cube attack and its varieties: non-linear cube attack, cube tester, dynamic cube attack at first. Then it summarized two side-channel cube attack models which were based on internal states leakage and fault information leakage and analyzed fault-tolerant mechanisms after that. It gave some extended study on cube attack as well. Finally, it pointed out the shortcomings in existed researches and predicted the possible directions for further study.
英文关键词 higher-order difference; algebraic attack; cube attack; side-channel cube attack
参考文献 查看稿件参考文献
  [1] Biham E, Shamir A. Differential cryptanalysis of the data encryption standard[M] . New York:Springer-Verlag, 1993:2-21.
[2] Biham E, Biryukov A, Shamir A. Miss in the middle attacks on IDEA and Khufu[C] //Proc of International Conference on Fast Software Encryption. Berlin:Springer, 1999:124-138.
[3] Matsui M. Linear cryptanalysis method for DES cipher[C] //Advances in Cryptology:EUROCRYPT. Berlin:Springer, 1994:386-397.
[4] Courtois N T, Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations[C] //Advances in Cryptology:ASIACRYPT. Berlin:Springer, 2002:267-287.
[5] Lai Xuejia. Higher order derivatives and differential cryptanalysis[C] //Communications and Cryptography. Boston:Springer, 1994:227-233.
[6] Vielhaber M. Breaking On:Fivium by AIDA an algebraic IV differe-ntial attack[EB/OL] . (2007-10-28)[2017-08-30] . http://eprint. iacr. org/2007/413. pdf.
[7] Dinur I, Shamir A. Cube attacks on Tweakable black box polynomials[EB/OL] . [2017-08-30] . http://eprint. iacr. org/2008/385. pdf.
[8] Sun Siwei, Hu Lei, Xie Yonghong, et al. Cube cryptanalysis of Hitag2 stream cipher[C] //Proc of the 10th International Conference on Cryptology and Network Security. Berlin:Springer-Verlag, 2011:15-25.
[9] Dinur I, Shamir A. Breaking Grain-128 with dynamic cube attacks[C] //Proc of International Conference on Fast Software Encryption. Berlin:Springer, 2011:167-187.
[10] Aumasson J P, Dinur I, Meier W, et al. Cube testers and key reco-very attacks on reduced-round MD6 and Trivium[C] //Proc of International Conference on Fast Software Encryption. Berlin:Springer, 2009:1-22.
[11] Dinur I, Shamir A. Side channel cube attacks on block ciphers[EB/OL] . (2009-03-18)[2017-08-30] . http://eprint. iacr. org/2009/127. pdf.
[12] Yang Lin, Wang Meiqin, Qiao Siyuan. Side channel cube attack on PRESENT[C] //Proc of International Conference on Cryptology and Network Security. Berlin:Springer, 2009:379-391.
[13] Zhao Xinjie, Guo Shize, Zhang Fan, et al. Enhanced side-channel cube attacks on PRESENT[J] . IEICE Trans on Fundamentals of Electronics, Communications and Computer Sciences, 2013, 96(1):332-339.
[14] Fan Xinxin, Gong Guang. On the security of Hummingbird-2 against side channel cube attacks[C] //Proc of Western European Workshop on Research in Cryptology. Berlin:Springer, 2012:18-29.
[15] Bard G V, Courtois N T, Nakahara J, et al. Algebraic, AIDA//cube and side channel analysis of KATAN family of block ciphers[C] //Proc of the 11th International Conference on Cryptology in India. Berlin:Springer, 2010:176-196.
[16] 孙宇, 王永娟. Cube攻击原理与改进[J] . 计算机科学, 2012, 39(Z6):77-80.
[17] Abdul-Latip S F, Reyhanitabar M R, Susilo W, et al. Extended cubes:enhancing the cube attack by extracting low-degree non-linear equations[C] //Proc of the 6th ACM Symposium on Information, Computer and Communications Security. New York:ACM Press, 2011:296-305.
[18] 王永娟, 丁立人, 任泉宇, 等. 二次检测立方攻击改进与实现[J] . 国防科技大学学报, 2015, 37(2):106-111.
[19] Alon N, Kaufman T, Krivelevich M, et al. Testing low-degree polynomials over GF(2)[C] //Approxiumation, Randomization and Combinatorial Optimization, Algorithms and Techniques. Berlin:Springer, 2003:188-199.
[20] Samorodnitsky A. Low-degree tests at large distances[C] //Proc of the 39th Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2007:506-515.
[21] Rabbaninejad R, Ahmadian Z, Salmasizadeh M, et al. Cube and dynamic cube attacks on SIMON32/64[C] //Proc of the 11th International ISC Conference on Information Security and Cryptology. Piscata-way, NJ:IEEE Press, 2014:98-103.
[22] Ahmadian Z, Rasoolzadeh S, Salmasizadeh M, et al. Automated Dynamic cube attack on block ciphers:cryptanalysis of SIMON and KATAN[EB/OL] . (2015-01-16)[2017-08-30] . http://eprint. iacr. org/2015/040. pdf.
[23] Banik S. Dynamic cube attack on 105 round Grain v1[EB/OL] . (2014-08-22)[2017-08-30] . http://eprint. iacr. org/2014/652. pdf.
[24] Rahimi M, Barmshory M, Mansouri M H, et al. Dynamic cube attack on Grain-v1[J] . IET Information Security, 2016, 10(4):165-172.
[25] Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[C] //Proc of Annual International Cryptology Conference. Berlin:Springer, 1996:104-113.
[26] Kocher P, Jaffe J, Jun B. Differential power analysis[C] //Proc of Annual International Cryptology Conference. Berlin:Springer, 1999:388-397.
[27] Handschuh H, Paillier P, Stern J. Probing attacks on tamper-resistant devices[C] //Proc of Internatioanl Conference on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 1999:303-315.
[28] Quisquater J J, Samyde D. A new tool for non-intrusive analysis of smart cards based on electro-magnetic emissions:the SEMA and DEMA methods[C] //Proc of Eurocrypt Rump Session. 2000.
[29] Boneh D , Demillo R A, Liprion R J. On the importance of checking cryptographic protocols for faults[C] //Advances in Cryptology:EUROCRYPT. Berlin:Spinger, 1997:37-51.
[30] Shamir A, Tromer E. Acoustic cryptanalysis:on nosy people and noisy machines[EB/OL] . (2004-05-11)[2009-03-05] . http://www. wisdom. weizmann. ac. il/~tromer/acoustic/.
[31] 郭世泽, 王韬, 赵新杰. 密码旁路分析原理与方法[M] . 北京:科学出版社, 2014.
[32] Abdul-Latip S F, Reyhanitabar M R, Susilo W, et al. On the security of NOEKEON against side channel cube attacks[C] //Proc of the 6th International Conference on Information Security, Practice and Experience. Berlin:Springer, 2010:45-55.
[33] 赵新杰, 郭世泽, 王韬, 等. EPCBC密码旁路立方体攻击[J] . 成都信息工程学院学报, 2012, 27(6):525-530.
[34] 刘会英, 王韬, 郭世泽, 等. MIBS密码旁路立方体攻击[J] . 计算机仿真, 2013, 30(5):302-305.
[35] Islam S, Afzal M, Rashdi A. On the security of LBlock against the cube attack and side channel cube attack[C] //Proc of International Conference on Availability, Relin Bility and Security. Berlin:Springer, 2013:105-121.
[36] Li Zhenqi, Zhang Bin, Yao Yuan, et al. Cube cryptanalysis of LBlock with noisy leakage[C] //Proc of the 15th International Conference on Information Security and Cryptology. Berlin:Springer, 2012:141-155.
[37] 穆道光, 张文政. 分组密码算法CTC的立方分析[J] . 信息安全与通信保密, 2012(7):132-135.
[38] Abdul-Latip S F, Reyhanitabar M R, Susilo W, et al. Fault analysis of the KATAN family of block ciphers[C] //Proc of the 8th International Conference on Information Security Practice and Experience. Berlin:Springer, 2012:319-336.
[39] 曾文. Trivium算法的fault cube攻击与可滑动对研究[D] . 郑州:信息工程大学, 2011.
[40] Li Zhenqi, Zhang Bin, Fan Junfeng, et al. A new model for error-tole-rant side-channel cube attacks[C] //Proc of the 15th International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2013:453-470.
[41] Li Zhenqi, Zhang Bin, Roy A, et al. Error-tolerant side-channel cube attack revisited[C] //Proc of Conference on Selected Areas in Cryptography. Cham:Springer, 2014:261-277.
[42] Courtois N T, Meier W. Algebraic attacks on stream ciphers with li-near feedback[C] //Proc of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Spinger, 2003:345-359.
[43] Courtois N T. Fast algebraic attacks on stream ciphers with linear feedback[C] //Proc of the 23rd Annual International Cryptology Conference. Berlin:Springer, 2003:176-194.
[44] Zhang A, Lim C W, Khoo K, et al. Extensions of the cube attack based on low degree annihilators[C] //Proc of the 8th International Conference on Cryptology and Network Security. Berlin:Springer, 2009:87-102.
[45] 丁立人, 王永娟. 对序列密码算法的改进cube攻击[J] . 计算机工程与应用, 2015, 51(21):111-115.
[46] 穆道光, 张文政. 迭代立方攻击及其应用[J] . 计算机工程与应用, 2014, 50(19):99-102.
[47] Mroczkowski P, Szmidt J. The algebraic cryptanalysis of the block cipher KATAN32 using modified cube attack[D] . Warsaw:Military University of Technology, 2011:345-354.
[48] Szmidt J. The cube attack on courtois toy cipher[C] //Proc of International Conference on Number-Theoretic Methods in Cryptology. Cham:Springer, 2017:241-253.
[49] 李俊志, 李文, 李伟, 等. 对简化版KeeLoq算法的中间相遇—立方攻击[J] . 上海交通大学学报, 2015, 49(10):1540-1544.
[50] Dinur I, Shamir A. Applying cube attacks to stream ciphers in realistic scenarios[J] . Cryptography and Communications, 2012, 4(3-4):217-232.
[51] Lu Chiayu, Lin Youwei, Jen Shangming, et al. Cryptanalysis on PHOTON hash function using cube attack[C] //Proc of International Conference on Information Security and Intelligent Control. Washington DC:IEEE Computer Society, 2012:278-281.
[52] Dinur I, Morawiecki P, Pieprszyk J, et al. Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function[C] //Proc of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2015:733-761.
[53] Fouque P A, Vannet T. Improving key recovery to 784 and 799 rounds of trivium using optimized cube attacks[C] //Proc of the 20th International Workshop on Fast Software Encryption. Berlin:Spirnger, 2013:502-517.
[54] Islam S, Haq I U. Cube attack on trivium and A5/1 stream ciphers[C] //Proc of the 13th International Conference on Applied Sciences and Technology. Piscataway, NJ:IEEE Press, 2016:409-415.
[55] 宋海欣, 范修斌, 武传坤, 等. 流密码算法Grain的立方攻击[J] . 软件学报, 2012, 23(1):171-176.
[56] Zhao Xinjie, Guo Shize, Zhang Fan, et al. Efficient hamming weight based side-channel cube attacks on PRESENT[J] . Journal of Systems & Software, 2012, 86(3):728-743.
[57] Soos M, Mohl K, Castelluccia C. Extending SAT solvers to cryptographic problems[C] //Proc of the 12th International Conference on Theory and Applications of Satisfiability Testing. Berlin:Springer, 2009:244-257.
[58] Faugere J C. Grbner bases[EB/OL] . (2007)[2017-08-30] . http://fse2007. uni. lu/slides/faugere. pdf.
[59] Oren Y, Kirschbaum M, Popp T, et al. Algebraic side-channel analysis in the presence of errors[C] //Proc of International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2010:428-442.
收稿日期 2017/7/3
修回日期 2017/8/31
页码 2245-2250
中图分类号 TP309.2
文献标志码 A