Side Channel Cube Attack Improvement and Application to Cryptographic Algorithm

被引:2
|
作者
Wang Yongjuan
Wang Tao [1 ]
Yuan Qingjun
Gao Yang
Wang Xiangbin
机构
[1] PLA Strateg Support Force Informat Engn Univ, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Cube attack; Side channel attack; Preprocessing; Quadric-detecting; MIBS algorithm;
D O I
10.11999/JEIT181075
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The complexity of the pre-processing phase of the cubic attack grows exponentially with the number of output bit algebras, and the difficulty of finding an effective cube set increases. In this paper, the algorithm of preprocessing stage in cubic attack is improved. In the cube set search, from random search to target search, a new target search optimization algorithm is designed to optimize the computational complexity of the preprocessing stage. In turn, the offline phase time complexity is significantly reduced. The improved cubic attack combined with the side-channel method is applied to the MIBS block cipher algorithm. The algorithm characteristics of MIBS are analyzed from the perspective of side-channel attack. The leak location is selected in the third round, and the overdetermined linear equations from initial key and output bit are established, which can directly recover 33bit key. Then the 6bit key can be recovered by quadric-detecting. The amount of plaintext required is 2(21.64), time complexity is 2(25). This result is greatly improved compared with the existing results, the number of keys recovered is increased, and the time complexity of the online phase is reduced.
引用
收藏
页码:1087 / 1093
页数:7
相关论文
共 20 条
  • [1] Abdul-Latip SF, 2010, LECT NOTES COMPUT SC, V6047, P45, DOI 10.1007/978-3-642-12827-1_4
  • [2] Ahmad, 2018, INT J COMP NETW COMM, P79, DOI DOI 10.5121/IJCNC.2018.10406
  • [3] AUMASSON JP, 2009, 16 INT WORKSH FAST S, V5665, P1, DOI DOI 10.1007/978-3-642-03317-9_1
  • [4] BLAHUT R E, 1994, COMMUNICATIONS CRYPT, P227, DOI [10.1007/ 978-1-4615- 2694-0_23., DOI 10.1007/978-1-4615-2694-0_23]
  • [5] DINUR I, 2009, 28 ANN INT C THEOR A, V5479, P278, DOI DOI 10.1007/978-3-642-01001-9_16
  • [6] Dinur I., 2009, CRYPTOLOGY, V2009, P127
  • [7] Dinur I, 2011, LECT NOTES COMPUT SC, V6733, P167
  • [8] Fischer S, 2008, LECT NOTES COMPUT SC, V5023, P236
  • [9] Conditional Cube Attack on Reduced-Round Keccak Sponge Function
    Huang, Senyang
    Wang, Xiaoyun
    Xu, Guangwu
    Wang, Meiqin
    Zhao, Jingyuan
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 259 - 288
  • [10] Izadi M, 2009, LECT NOTES COMPUT SC, V5888, P334, DOI 10.1007/978-3-642-10433-6_22