高级检索
    马向亮, 李冰, 习伟, 陈华, 陈财森. 基于独立分量技术的类GIFT算法S盒逆向分析[J]. 计算机研究与发展, 2018, 55(10): 2269-2277. DOI: 10.7544/issn1000-1239.2018.20180427
    引用本文: 马向亮, 李冰, 习伟, 陈华, 陈财森. 基于独立分量技术的类GIFT算法S盒逆向分析[J]. 计算机研究与发展, 2018, 55(10): 2269-2277. DOI: 10.7544/issn1000-1239.2018.20180427
    Ma Xiangliang, Li Bing, Xi Wei, Chen Hua, Chen Caisen. Reverse-Analysis of S-Box for GIFT-Like Algorithms Based on Independent Component Analysis Technology[J]. Journal of Computer Research and Development, 2018, 55(10): 2269-2277. DOI: 10.7544/issn1000-1239.2018.20180427
    Citation: Ma Xiangliang, Li Bing, Xi Wei, Chen Hua, Chen Caisen. Reverse-Analysis of S-Box for GIFT-Like Algorithms Based on Independent Component Analysis Technology[J]. Journal of Computer Research and Development, 2018, 55(10): 2269-2277. DOI: 10.7544/issn1000-1239.2018.20180427

    基于独立分量技术的类GIFT算法S盒逆向分析

    Reverse-Analysis of S-Box for GIFT-Like Algorithms Based on Independent Component Analysis Technology

    • 摘要: 在实际密码系统或模块的安全性评估中,对未知密码算法的逆向分析是一项重要的评估内容.目前关于密码算法的逆向分析方式主要分为数学分析和物理旁路分析2种,后者因其代价低、通用性高等优点更为流行.基于独立分量技术的侧信道分析技术绕过传统侧信道分析中的“先猜测后确定”的攻击思路限制,直接恢复中间状态值.研究了类GIFT算法在逆向分析下的安全性,利用GIFT算法结构的特点,将P置换输入作为独立分量攻击观测条件,利用独立分量技术成功恢复出了S盒内容.该结果是最早关于类GIFT算法的逆向分析结果之一,其方法对于其他未知算法的逆向分析也具有参考意义.

       

      Abstract: In the security evaluation of practical crypto system or module, the reverse analysis of unknown cryptographic algorithm is an important evaluation content. At present, the reverse analysis methods of cryptographic algorithms mainly contain mathematical analysis and physical bypass analysis, among which the latter is more popular due to its low cost and high universality. The side-channel analysis technology based on independent component analysis technology recovers the intermediate state value directly, bypassing the limitation of the “guess-and-determine” attack idea in the traditional side-channel analysis. This paper studies the safety of GIFT-like algorithm under the reverse analysis. We successfully recovered the content of the S-box by independent component analysis (ICA) technology, taking advantage of the characteristics of GIFT algorithm structure and taking the inputs of P permutation as observation conditions. The result of this paper is one of the reverse analysis results of the GIFT-like algorithm, and the method is also of reference significance to the reverse analysis of other unknown algorithms.

       

    /

    返回文章
    返回