Font Size: a A A

Research On The Technologies Of Cipher Security Evaluation Based On Side Channel Analysis

Posted on:2021-04-05Degree:DoctorType:Dissertation
Country:ChinaCandidate:S FuFull Text:PDF
GTID:1368330605481247Subject:Information security
Abstract/Summary:PDF Full Text Request
Along with the development of the mobile Internet,various types of Internet of Things terminals and embedded devices have been widely used in daily life,such as smart IC cards,mobile terminals,RFID tags,and wireless sensor networks.Due to the deep integration of devices and networks in the life,a large amount of sensitive data is retained in the device.In order to protect the security of the device and the network,and also to protect the users'privacy data,the attacker is prevented from recovering the sensitive data through cryptography.A variety of new cryptographic techniques are beginning to be applied in these devices and networks.Side channel analysis techniques,especially power analysis techniques,are common attacking methods for such devices,and they make it possible to recover sensitive data such as secret keys.Compared with the traditional mathematics-based cryptanalysis methods,the side channel analysis has the advantages of easy operation,strong portability,and suitability for black-box analysis.Therefore,it is valued by designers,attackers and third-party evaluation organizations in practical applications.With more and more complex application scenarios of cryptographic algorithms,the cryptographic algorithms have high frequency,high performance and relatively independent functions.The research on cryptographic algorithms security evaluation technology based on side channel analysis will promote the security implementation of cryptographic algorithms in practical applications,and promote the development of cryptographic algorithm design and countermeasures.Side channel analysis will help to find out the problems in the design and implementation of the cryptographic algorithms;it is conducive to deeper security assessment of cryptographic chips and other products,promote the healthy and orderly development of the industrial ecology,and protect users' privacy data and personal information security.Therefore,side channel analysis techniques require more research and attention.Based on the side channel analysis,this paper starts the research work from the power analysis and the fault injection analysis.In terms of power analysis technology,in-depth research is made on the leakage model and attack methods,and a leak model and two side channel attack methods are proposed.In terms of fault injection analysis technology,a Fault-free IV based Differential Fault Analysis method is proposed.The main work and contributions of this article are as follows:(1)Starting from the side channel power analysis method,an Independent Bit Leakage model based on Multiple Linear Regression is proposed.Different from the traditional Hamming weight leakage model,this model can realize the power characterization and leakage analysis of independent bits,and can more accurately describe the mathematical connection between each independent bit of the intermediate value and the leakage value,reducing the restrictions.Also,the model introduces multiple linear regression method in the parameter calculation stage,which solves the problem of low analysis efficiency caused by the leakage value complementation when each bit in the traditional Hamming weight model changes.The accuracy of the model was verified by simulation and real experiments.(2)Combining the Independent Bit Leakage model and the theory of multiple linear regression,a Multi-byte Power Analysis method is proposed.Different from the traditional power analysis method,MPA does not need to perform key guessing,and can recover multiple bytes of the key at the same time.Especially for long-key cryptographic algorithms,it has high attack efficiency.Compared with the CPA,the efficiency is increased by 70.6%under experiments.This method has advantages in attack efficiency and success rate when analyzing leakages of XOR operation.Because XOR operation is the basic component of a cryptographic algorithm,this method will be able to implement effective side-channel attacks on many cryptographic algorithms,and it will be applied to many common cryptographic side-channel analysis scenarios.It has significance for the security evaluation of cryptographic algorithms.(3)Combining the characteristics of Multiple Linear Regression distinguisher,a Chosen Plaintext Attack method based on multiple linear regression is proposed.Using multiple linear regression correlation coefficients as the distinguisher,the value of the round output will only affect the sign of some bits in the intermediate value,and will not change the linearity between the intermediate value and the power leakage.Using this characteristics,the MLR based Chosen Plaintext Attack has a higher attack success rate and efficiency comparing with the Pearson based method.Experiments show that the efficiency is increased by about 68%,and the expected success rate is increased by about 40%.This attack method has strong scalability,and can successfully implement side-channel attacks on mask protection' schemes,which will become an important method for conducting cryptographic algorithm security assessment technology.(4)Combining the characteristics of the ITUbee cryptographic algorithm,a Fault-free IV based Differential Fault Analysis method is proposed.Different from the traditional DFA method,the FDFA not only uses the fault value,but also uses the fault-free difference between two intermediate values which produced by the plaintexts.This attack method was used to effectively attack ITUbee cipher.Under the condition of 4 fault injections,it can be achieved by only 225 round operations.This fault analysis method can also be used to implement security evaluation of other block ciphers with similar structures.
Keywords/Search Tags:side channel analysis, multiple linear regression, chosen plaintext attack, independent bits leakage, differential fault analysis
PDF Full Text Request
Related items