(國防科學技術大學理學院, 湖南 長沙 410073)
摘要:在2012年亞密會上,Borgho等人提出了一個低延時的輕量級密碼算法—PRINCE。本文基于第2輪單比特泄漏模型對PRINCE算法進行了旁路Cube攻擊。通過對加密算法的分析,實現了對2輪PRINCE算法單比特Cube項的遍歷搜索。針對第1個S盒的最低位信息泄露,使用210.658個選擇明文可恢復48位密鑰。另外,文中的分析可用于對其它低輪分組密碼的Cube項搜索。
關鍵詞:PRINCE算法;旁路Cube攻擊;泄漏模型
Side Channel Cube Attack on PRINCE
Cheng Lei, Sun Bing, Li Chao
(College of Science, National University of Defense Technology, Changsha Hunan 410073, China.)
Abstract. At Asiacrypt 2012, Borgho et al, proposed PRINCE, which is a lightweight block cipher with low-latency. Based on the single bit leakage model in round 2, this paper proposes a side-channel cube attack on PRINCE. By analyzing the structure of the encrypt arithmetic, we could search all cube term based on the single bit in round 2 of PRINCE. As to the first output bit leakage of the first S-Box, 210.658 chosen plaintexts can recover 48 key bits. The analysis method of this paper can also be applied to other lightweight block ciphers.
Keywords: PRINCE; side-channel cube analysis; leakage model
參考文獻(References)
[1] Cannic C.D., Dunkelamn O., KATAN and KTANTAN-A Family of Small and Efficicnt Hardware Oriented Block Ciphers. CHES 2009. Springer, pp. 272-288.
[2] Bogdanov A., Knudsen L.R., Leander G., et al, PRESENT: An Ultra-Lightweight Block Ciphers. CHES 2007. Springer, pp. 450-466.
[3] Guo J., Peyrin T., Poschmann A., and Robshaw M., The LED Block Cipher. CHES 2011, Springer, pp. 326-341.
[4] Wu W., Zhang L., LBlock: A Lightweight Block Cipher. ACNS 2011. Springer, pp. 327-344.
[5] Borgho J., Canteaut A., G¨uneysu T., et al, PRINCE-A Low-latency Block Cipher for Pervasive Computing Applications. Asiacrypt 2012.
[6] Soleimany H., Bondeau C., Yu X., Wu W., et al. Reflection Cryptanalysis of PRINCE-like Ciphers. FSE 2013.
[7] Itai Dinur and Adi Shamir.. Cube attacks on tweakable black box polynomials. In EUROCRYPT ’09: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques. Springer-Verlag, 2009.
[8] Pierre-Alain Fouque and Thomas Vannet. Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks. In FSE 2013.
[9] Itai Dinur and Adi Shamir. Generic Analysis of Small Cryptographic Leaks. 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[10] Yang Lin, Wang Meiqin, Qiao S. Side channel cube attack on PRESENT. CANS 2009, Springer, pp. 379-391.
[11] Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, et al, Extended Cubes: Enhancing the Cube Attack by Extracting Low-Degree Non-Linear Equations. ASIACCS 2011, ACM, 2011:296-305.
[12] Itai Dinur and Adi Shamir. Applying cube attacks to stream ciphers in realistic scenarios.Cryptogr. Commun.(2012) 4:217-232.
作者簡介:
成磊, 男, 1988年生, 上海人, 碩士研究生, 研究方向:信息安全;
聯系人:李超 通信地址:湖南省長沙市國防科學技術大學理學院 410073
電子信箱:academic_lc@163.com 電話:13875272418