针对 SNOW3G 流密码算法的侧信道分析
SNOW3G 是由 ETSI/SAGE 于 2006 年基于 SNOW2.0 设计的流密码算法, 已被 3GPP 采纳为国际加密标准, 并在 4G/5G 移动通信中作为数据机密性算法和数据完整性算法的核心算法使用. 已有大量研究工作证明了 SNOW3G 算法足以抵御传统的密码分析攻击, 但很少有工作对该算法的具体实现进行分析, 验证算法抵抗侧信道攻击的能力. 本文以 3GPP 标准中 SNOW3G 的算法实现为研究对象, 从侧信道的角度出发在单片机上研究该算法的安全性, 提出了针对该算法的相关性能量攻击方法. 首先, 对 SNOW3G 的算法实现进行分析, 找到算法中存在能量泄漏的操作, 然后...
Saved in:
Published in | Journal of Cryptologic Research Vol. 9; no. 6; p. 1141 |
---|---|
Main Authors | , , , , , , , , , , , |
Format | Journal Article |
Language | Chinese |
Published |
Beijing
Chinese Association for Cryptologic Research, Journal of Cryptologic Research
01.12.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | SNOW3G 是由 ETSI/SAGE 于 2006 年基于 SNOW2.0 设计的流密码算法, 已被 3GPP 采纳为国际加密标准, 并在 4G/5G 移动通信中作为数据机密性算法和数据完整性算法的核心算法使用. 已有大量研究工作证明了 SNOW3G 算法足以抵御传统的密码分析攻击, 但很少有工作对该算法的具体实现进行分析, 验证算法抵抗侧信道攻击的能力. 本文以 3GPP 标准中 SNOW3G 的算法实现为研究对象, 从侧信道的角度出发在单片机上研究该算法的安全性, 提出了针对该算法的相关性能量攻击方法. 首先, 对 SNOW3G 的算法实现进行分析, 找到算法中存在能量泄漏的操作, 然后根据算法中密钥与该操作间的联系制定合理的攻击策略, 最终恢复出算法的密钥. 通过实验对提出的相关性能量攻击方法进行了验证, 结果表明, 在装有 ATMega128A 芯片的单片机上, 利用该方法仅需使用2000条能量消耗曲线即可在 1 小时内完整恢复出算法的密钥. |
---|---|
AbstractList | SNOW3G 是由 ETSI/SAGE 于 2006 年基于 SNOW2.0 设计的流密码算法, 已被 3GPP 采纳为国际加密标准, 并在 4G/5G 移动通信中作为数据机密性算法和数据完整性算法的核心算法使用. 已有大量研究工作证明了 SNOW3G 算法足以抵御传统的密码分析攻击, 但很少有工作对该算法的具体实现进行分析, 验证算法抵抗侧信道攻击的能力. 本文以 3GPP 标准中 SNOW3G 的算法实现为研究对象, 从侧信道的角度出发在单片机上研究该算法的安全性, 提出了针对该算法的相关性能量攻击方法. 首先, 对 SNOW3G 的算法实现进行分析, 找到算法中存在能量泄漏的操作, 然后根据算法中密钥与该操作间的联系制定合理的攻击策略, 最终恢复出算法的密钥. 通过实验对提出的相关性能量攻击方法进行了验证, 结果表明, 在装有 ATMega128A 芯片的单片机上, 利用该方法仅需使用2000条能量消耗曲线即可在 1 小时内完整恢复出算法的密钥. |
Author | Da-Wu, GU Xiao-Lin, ZHANG 原义栋 ZHANG, Chi WANG, Zheng LU, Yan 张驰 王铮 卢岩 Yi-Dong, YUAN 张效林 谷大武 |
Author_xml | – sequence: 1 givenname: Zheng surname: WANG fullname: WANG, Zheng – sequence: 2 givenname: Chi surname: ZHANG fullname: ZHANG, Chi – sequence: 3 givenname: GU surname: Da-Wu fullname: Da-Wu, GU – sequence: 4 givenname: ZHANG surname: Xiao-Lin fullname: Xiao-Lin, ZHANG – sequence: 5 givenname: Yan surname: LU fullname: LU, Yan – sequence: 6 givenname: YUAN surname: Yi-Dong fullname: Yi-Dong, YUAN – sequence: 7 fullname: 王铮 – sequence: 8 fullname: 张驰 – sequence: 9 fullname: 谷大武 – sequence: 10 fullname: 张效林 – sequence: 11 fullname: 卢岩 – sequence: 12 fullname: 原义栋 |
BookMark | eNrjYmDJy89LZWCQMjTQMzS2MLPQz9JLzsvO1MtKLtIzMDAwNTdmYeA0MrA01zUxNDTjYOAtLs5MMjA1NTO2MDIx5GTQfzmp4-n6nQrBfv7hxu4Kz7Y2Pl3f9nxB4_N1059tnvp8VsuTfcuf7F_4snHy0462Z_Mm8DCwpiXmFKfyQmluhlA31xBnD10ff3dPZ0cf3QJDIwtj3ZRkw-Q0S8tEIG1sYJKaZpJimJKUZmpuYGRiZG6YaGhpkmhskmgElEtKMzdINE40MzBLTTQySkk1sUw0TzMx5mZQhphbUJRfWJpaXBKflV9alAe0Mt7IwsLE0tzS0sLEGAAdsFNS |
ContentType | Journal Article |
Copyright | 2022. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2022. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | JQ2 |
DOI | 10.13868/j.cnki.jcr.000573 |
DatabaseName | ProQuest Computer Science Collection |
DatabaseTitle | ProQuest Computer Science Collection |
DatabaseTitleList | ProQuest Computer Science Collection |
DeliveryMethod | fulltext_linktorsrc |
GroupedDBID | -SI -S~ ALMA_UNASSIGNED_HOLDINGS CAJEI JQ2 PB1 PB9 Q-- |
ID | FETCH-LOGICAL-p1283-dc1cf99adc1304ef4d1dbf57024271a194a34a2304bf70a3a606ea22de49a7f43 |
ISSN | 2097-4116 |
IngestDate | Mon Jun 30 15:01:03 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 6 |
Language | Chinese |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p1283-dc1cf99adc1304ef4d1dbf57024271a194a34a2304bf70a3a606ea22de49a7f43 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2884979984 |
PQPubID | 6503834 |
ParticipantIDs | proquest_journals_2884979984 |
PublicationCentury | 2000 |
PublicationDate | 2022-12-01 |
PublicationDateYYYYMMDD | 2022-12-01 |
PublicationDate_xml | – month: 12 year: 2022 text: 2022-12-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Beijing |
PublicationPlace_xml | – name: Beijing |
PublicationTitle | Journal of Cryptologic Research |
PublicationYear | 2022 |
Publisher | Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
Publisher_xml | – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
SSID | ssib055638241 ssib058688234 |
Score | 2.2993503 |
Snippet | SNOW3G 是由 ETSI/SAGE 于 2006 年基于 SNOW2.0 设计的流密码算法, 已被 3GPP 采纳为国际加密标准, 并在 4G/5G 移动通信中作为数据机密性算法和数据完整性算法的核心算法使用. 已有大量研究工作证明了 SNOW3G 算法足以抵御传统的密码分析攻击,... |
SourceID | proquest |
SourceType | Aggregation Database |
StartPage | 1141 |
SubjectTerms | Algorithms Cryptography Power consumption |
Title | 针对 SNOW3G 流密码算法的侧信道分析 |
URI | https://www.proquest.com/docview/2884979984 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLdKd-GCQID42FAP-DRlS_yR2Me0SqlQ6RC0WsWlcr7UDqmbSnvYbpXQtCMCISQOCE7c2AFx4DL-mbXV_guek_QDVj4vjvUc20ney_PP9nvPCN3ldkxjW3KD-5wbzHdCwzet2KAwHTKtSDCWBDB9ULMrDXa_yZu53MmC1dKg728EB0v9Sv6Hq0ADvmov2X_g7KxRIEAe-AspcBjSv-Ix9iSWBAuBPY7dMi7K9ce1rW16bx17Ni5ygIlZibCx52DXTCiQ8bB0knsollxTpIsFwx7DRQ-7TpIpY9fSPUAVSXU70I9ux8YSqpu_gLWl3v5eP9WoM7O-meZ3Uw-pJ-0oGzD1knUlo5banfm6ubE9SJbsG1NSs6N2jWoa8SCpsrheQchPth_6WPBIx1yZS19iULns6dJNhD-_QKIuiSkdg1mp5-ZUt8sFEV7U0zALtJYOIFTYIhlBgu7TzsZO0NMBLnl62sqP0bprW61yo1pt1b1m_QJaITBNIXm0UvRqDx9NNZqOvibIHHByaF2QxNRh9riZJ5fuePNct-cQQgJ76pfRpey7FNxU-K6g3EH7Kto8e3k0Ov5aSIWtMP4yHB0fTt4PJ5_ejD-_nrx9fnry8fTbh7Phq9HR4fjdi2uoUfbqpYqRnbxh7AFeoUYYWEEspYIrNVkUs9AK_Zg7GtA5lrIkU5QpvZ_gx46pqIJpcKQICSMmlRMzeh3lu7vd6AYqUBlZcRgwymIbwLoUKqJKsUj4TAkA_zfR6vQNW9mv9axFhGB6v1mwW78vvo0uzmVsFeX7vUG0Biix79_JWPEddu5jBA |
linkProvider | ProQuest |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E9%92%88%E5%AF%B9+SNOW3G+%E6%B5%81%E5%AF%86%E7%A0%81%E7%AE%97%E6%B3%95%E7%9A%84%E4%BE%A7%E4%BF%A1%E9%81%93%E5%88%86%E6%9E%90&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=WANG%2C+Zheng&rft.au=ZHANG%2C+Chi&rft.au=Da-Wu%2C+GU&rft.au=Xiao-Lin%2C+ZHANG&rft.date=2022-12-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=9&rft.issue=6&rft.spage=1141&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000573&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon |