ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2018, Vol. 55 ›› Issue (10): 2269-2277.doi: 10.7544/issn1000-1239.2018.20180427

Special Issue: 2018分布式安全与区块链技术研究专题

Previous Articles     Next Articles

Reverse-Analysis of S-Box for GIFT-Like Algorithms Based on Independent Component Analysis Technology

Ma Xiangliang1,2,3, Li Bing3, Xi Wei4, Chen Hua1, Chen Caisen5   

  1. 1(Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing 100190);2(University of Chinese Academy of Sciences, Beijing 100049);3(National Research Center for Information Technology Security, Beijing 100084);4(Southern Power Grid Science Research Institute, Guangzhou 510663);5(Department of Training Center, Academy of Army Armored Force, Beijing 100072)
  • Online:2018-10-01

Abstract: In the security evaluation of practical crypto system or module, the reverse analysis of unknown cryptographic algorithm is an important evaluation content. At present, the reverse analysis methods of cryptographic algorithms mainly contain mathematical analysis and physical bypass analysis, among which the latter is more popular due to its low cost and high universality. The side-channel analysis technology based on independent component analysis technology recovers the intermediate state value directly, bypassing the limitation of the “guess-and-determine” attack idea in the traditional side-channel analysis. This paper studies the safety of GIFT-like algorithm under the reverse analysis. We successfully recovered the content of the S-box by independent component analysis (ICA) technology, taking advantage of the characteristics of GIFT algorithm structure and taking the inputs of P permutation as observation conditions. The result of this paper is one of the reverse analysis results of the GIFT-like algorithm, and the method is also of reference significance to the reverse analysis of other unknown algorithms.

Key words: independent component analysis (ICA), reverse analysis, S box, GIFT algorithm, power analysis

CLC Number: