ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2018, Vol. 55 ›› Issue (10): 2269-2277.doi: 10.7544/issn1000-1239.2018.20180427

所属专题: 2018分布式安全与区块链技术研究专题

• 信息安全 • 上一篇    下一篇

基于独立分量技术的类GIFT算法S盒逆向分析

马向亮1,2,3,李冰3,习伟4,陈华1,陈财森5   

  1. 1(中国科学院软件研究所可信计算与信息保障实验室 北京 100190);2(中国科学院大学 北京 100049);3(国家信息技术安全研究中心 北京 100084);4(南方电网科学研究院 广州 510663);5(陆军装甲兵学院演训中心 北京 100072) (maxiangliang@163.com)
  • 出版日期: 2018-10-01
  • 基金资助: 
    国家重点研发计划(2018YFB0904901,2016YFF0204005,2016YFF0204003,2016YFF0204002);国家自然科学基金项目(61402528);“十三五”装备预研领域基金项目(6140002020115);CCF-启明星辰“鸿雁”科研计划(2017003)

Reverse-Analysis of S-Box for GIFT-Like Algorithms Based on Independent Component Analysis Technology

Ma Xiangliang1,2,3, Li Bing3, Xi Wei4, Chen Hua1, Chen Caisen5   

  1. 1(Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing 100190);2(University of Chinese Academy of Sciences, Beijing 100049);3(National Research Center for Information Technology Security, Beijing 100084);4(Southern Power Grid Science Research Institute, Guangzhou 510663);5(Department of Training Center, Academy of Army Armored Force, Beijing 100072)
  • Online: 2018-10-01

摘要: 在实际密码系统或模块的安全性评估中,对未知密码算法的逆向分析是一项重要的评估内容.目前关于密码算法的逆向分析方式主要分为数学分析和物理旁路分析2种,后者因其代价低、通用性高等优点更为流行.基于独立分量技术的侧信道分析技术绕过传统侧信道分析中的“先猜测后确定”的攻击思路限制,直接恢复中间状态值.研究了类GIFT算法在逆向分析下的安全性,利用GIFT算法结构的特点,将P置换输入作为独立分量攻击观测条件,利用独立分量技术成功恢复出了S盒内容.该结果是最早关于类GIFT算法的逆向分析结果之一,其方法对于其他未知算法的逆向分析也具有参考意义.

关键词: 独立分量分析, 逆向分析, S盒, GIFT算法, 能量分析

Abstract: In the security evaluation of practical crypto system or module, the reverse analysis of unknown cryptographic algorithm is an important evaluation content. At present, the reverse analysis methods of cryptographic algorithms mainly contain mathematical analysis and physical bypass analysis, among which the latter is more popular due to its low cost and high universality. The side-channel analysis technology based on independent component analysis technology recovers the intermediate state value directly, bypassing the limitation of the “guess-and-determine” attack idea in the traditional side-channel analysis. This paper studies the safety of GIFT-like algorithm under the reverse analysis. We successfully recovered the content of the S-box by independent component analysis (ICA) technology, taking advantage of the characteristics of GIFT algorithm structure and taking the inputs of P permutation as observation conditions. The result of this paper is one of the reverse analysis results of the GIFT-like algorithm, and the method is also of reference significance to the reverse analysis of other unknown algorithms.

Key words: independent component analysis (ICA), reverse analysis, S box, GIFT algorithm, power analysis

中图分类号: