高级检索

    物联网中MIBS轻量级密码的唯密文故障分析

    Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things

    • 摘要: MIBS密码是在2009年的密码学和网络安全(CANS)会议上提出的一种轻量级算法,它具有较高的软硬件实现效率,并且能够抵抗差分分析、线性分析等传统密码分析方法,适合运行在资源受限,并有一定安全要求的物联网环境中.提出了一种针对MIBS密码的新型唯密文故障攻击,即利用新型双重“与”故障模型、新型Parzen-HW和Parzen-HW-MLE区分器对中间状态进行分析,进而破译MIBS密码.实验表明:该方法最少使用72个故障注入即可破译出主密钥,并且成功率不小于99%.该方法可以进一步降低故障注入数和时间,有效地提高了攻击效率.研究表明:唯密文故障攻击对MIBS密码算法的安全性造成极大的威胁,为其他轻量级密码的安全性分析提供了重要参考.

       

      Abstract: The lightweight cryptosystem MIBS was proposed at the CANS conference in 2009. It has high efficiency in both hardware implementation and software implementation. MIBS can resist against classical cryptanalysis, such as differential analysis and linear analysis, etc. It is suitable for the resource-limited devices in the Internet of things. This paper proposes new ciphertext-only fault analysis of the MIBS cryptosystem. The attackers can apply a new fault model of Double AND and two novel distinguishers of Parzen-HW and Parzen-HW-MLE to break MIBS. The experiments only require at least 72 fault injections to recover the secret key with a success probability of no less than 99%. The method can further reduce fault injections and time, and effectively improve the attacking efficiency. It shows that the ciphertext-only fault analysis poses a serious threaten to the security of MIBS. The research also provides an important reference for the security analysis of other lightweight cryptosystems.

       

    /

    返回文章
    返回