Font Size: a A A

Research On Side Channel Attack And Protection On GIFT

Posted on:2021-09-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q LiFull Text:PDF
GTID:2518306308470224Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
Side channel analysis attack is an attack method that uses the relationship between the power consumption generated by a cryptographic device during the encryption process and its current operand.The attacker collects the power consumption data to crack the corresponding operands.As one of the most energy-efficient algorithms,GIFT,a lightweight block cipher algorithm,achieves smaller and faster results.Its security in the field of side channel analysis has also received corresponding attention.When the GIFT algorithm is implemented on a cryptographic device,it is important to evaluate its security and fix its vulnerabilities.Based on some attack and defense methods in the last ten years,this paper analyzes the security of the GIFT algorithm,finds its security problems,and proposes corresponding protection schemes to protect its security.Specifically,this paper mainly completed the following tasks:(1)Analyze the attack methods that an attacker may use under different attack conditions,including Correlation Power Analysis(CPA),Mutual Information Analysis(MIA),and Template Analysis(TA).This paper uses the above attack methods to analyze the side channel data of the GIFT algorithm,and gives the location of intermediate data that can be easily cracked by the attacker;(2)To protect the intermediate data that GIFT algorithm is vulnerable to,the single-mask protection scheme and double-mask protection scheme are designed for the limit of increasing the chip load as little as possible.Both of them increase the GIFT algorithm's ability to resist the above-mentioned attacks.However,when the attacker obtains the information about the time points of power consumption related to the target intermediate value,the cryptographic device still has security risks;(3)For the potential safety hazards of the single-mask protection scheme and the double-mask protection scheme,this paper combines the characteristics of the fixed-value mask scheme and the Rotating S-box Masking(RSM)scheme,designs a Random Loop Mask(RLM)scheme.The security analysis of the scheme under the attacks above shows that the scheme is sufficient to resist CPA,MIA,TA,and second order CPA attacks.It also shows good results in protecting the actual key under the condition of known leak points.
Keywords/Search Tags:Side Channel Analysis, GIFT, Masking
PDF Full Text Request
Related items