认证加密算法SILC的统计无效故障攻击研究

STATISTICAL INEFFECTIVE FAULT ANALYSIS OF THE SILC AUTHENTICATED ENCRYPTION

  • 摘要: 目前,SILC密码的安全性分析成果的攻击假设集中在已知明文攻击和选择明文攻击,而攻击者能力最弱的唯密文攻击则尚无相关研究。统计无效故障攻击是一种针对密码算法的实现进行故障注入的唯密文分析方法,其特点在于能够在密码设备仅有正确输出的情况下恢复主密钥。针对SILC密码在统计无效故障攻击下的安全性展开研究。理论分析与实验结果表明,SILC算法不能抵御统计无效故障攻击,所提出的新型区分器库莱散度-汉明重量和巴氏距离-极大似然估计仅需432和440个无效故障,即可恢复SILC的主密钥。相较于经典区分器,新型区分器不仅将故障数、耗时和复杂度分别降低55.00%、53.75%和58.30%,而且提升了可靠度和准确度。该研究对轻量级认证加密算法的实现安全方面提供了重要参考。

     

    Abstract: Recently, research on the security of the SILC focuses on known plaintext attack and chosen plaintext attack. There is a lack of research on ciphertext-only attack that the attackers carry the weakest capability. Statistical ineffective fault attack (SIFA) is a ciphertext-only attacking method of injecting faults against the implementation of ciphers. It can recover the secret key even when the cryptographic device outputs correct results only. This paper studies the security of SILC against SIFA. The theoretical analysis and experimental results show that the SILC lightweight authenticated encryption cannot resist SIFA. The proposed novel double distinguishers of KLD-HW and BD-MLE can recover the secret key of SILC with only 432 and 440 ineffective faults, respectively. Compared with classical distinguishers, the novel distinguishers not only reduce the number of faults, latency and complexity by 55.00%, 53.75%, and 58.30%, respectively, but also improve reliability and accuracy. These results provide a valuable insight for the secure of design and implementation of lightweight AEADs.

     

/

返回文章
返回