Font Size: a A A

Algebraic Side-channel Attacks On The PRESENT Algorithm

Posted on:2019-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y D ZhangFull Text:PDF
GTID:2348330569996017Subject:Engineering
Abstract/Summary:PDF Full Text Request
Information security is an important part of national security,and cryptography is an important cornerstone of information security.Various hardware devices which containing cryptosystems have been used in social activities widely.The relevant cryptographic algorithm is dominated by lightweight block cipher,such as the PRESENT algorithm.Algebraic side-channel attack is the one of the important methods in the field of cryptanalysis.It subverts the traditional mode of thinking and created a huge threat to the security of cryptographic hardware devices.This article the Algebraic side-channel attack method is adopied to test the PRESENT algorithm.First of all,a large number of research and study work have been carried out,including the study of the basic theory refer to cryptography and PRESENT algorithm.Secondly,the basic principles and research status of algebraic attacks,side-channel attacks,and algebraic side-channel attack are highlighted.Finally,the Hamming weight model and template attack are determined as the implementation method of the algebraic side channel attack.The main attack object is the S box operation in the PRESENT algorithm.The purpose is to obtain the Hamming weight of the input and output from the S box as side Channel information.The side channel information is converted into an additional algebraic equation,which can improve the efficiency of the original algebraic equations.In addition,it is necessary to build a hardware experiment platform,for the convenience of the actual measurement of attacks and simulation experiments.The standard of effective attack is to solve the algebraic equations in a reasonable time,that is,recover the key.Therefore,this paper also tests the required amount of side channel information.Of course,experiments were also conducted on attacks under multiple scenarios.This paper confirms the effectiveness of Algebraic side-channel attacks on the PRESENT algoritm.At the same time,it found that in the template matching phase,when the number of points of interesting is set as 30 and the Filter coefficient is 0.7,the attack would get the best effect.In addition,at least the first 2 rounds of S-box side information are required to attack under known ciphertext conditions.At least the first 3 rounds of S-box side information are required to attack under known plaintext conditions.At least the first 4 rounds of S-box side information are required to attack under the unknown ciphertext conditions.After this experiment,we accumulated experience for other block cipher attacks,build a foundation for the subsequent establishment of algebraic side channel attack platforms.In addition,research work can also be carried out from the perspective of defending Algebraic side-channel attacks.
Keywords/Search Tags:PRESENT algorithm, Algebraic side-channel attack, Hamming Weight, Template Attacks
PDF Full Text Request
Related items