Advanced Search
    Ma Xiangliang, Li Bing, Xi Wei, Chen Hua, Chen Caisen. Reverse-Analysis of S-Box for GIFT-Like Algorithms Based on Independent Component Analysis Technology[J]. Journal of Computer Research and Development, 2018, 55(10): 2269-2277. DOI: 10.7544/issn1000-1239.2018.20180427
    Citation: Ma Xiangliang, Li Bing, Xi Wei, Chen Hua, Chen Caisen. Reverse-Analysis of S-Box for GIFT-Like Algorithms Based on Independent Component Analysis Technology[J]. Journal of Computer Research and Development, 2018, 55(10): 2269-2277. DOI: 10.7544/issn1000-1239.2018.20180427

    Reverse-Analysis of S-Box for GIFT-Like Algorithms Based on Independent Component Analysis Technology

    • In the security evaluation of practical crypto system or module, the reverse analysis of unknown cryptographic algorithm is an important evaluation content. At present, the reverse analysis methods of cryptographic algorithms mainly contain mathematical analysis and physical bypass analysis, among which the latter is more popular due to its low cost and high universality. The side-channel analysis technology based on independent component analysis technology recovers the intermediate state value directly, bypassing the limitation of the “guess-and-determine” attack idea in the traditional side-channel analysis. This paper studies the safety of GIFT-like algorithm under the reverse analysis. We successfully recovered the content of the S-box by independent component analysis (ICA) technology, taking advantage of the characteristics of GIFT algorithm structure and taking the inputs of P permutation as observation conditions. The result of this paper is one of the reverse analysis results of the GIFT-like algorithm, and the method is also of reference significance to the reverse analysis of other unknown algorithms.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return