针对 SNOW3G 流密码算法的侧信道分析

SNOW3G 是由 ETSI/SAGE 于 2006 年基于 SNOW2.0 设计的流密码算法, 已被 3GPP 采纳为国际加密标准, 并在 4G/5G 移动通信中作为数据机密性算法和数据完整性算法的核心算法使用. 已有大量研究工作证明了 SNOW3G 算法足以抵御传统的密码分析攻击, 但很少有工作对该算法的具体实现进行分析, 验证算法抵抗侧信道攻击的能力. 本文以 3GPP 标准中 SNOW3G 的算法实现为研究对象, 从侧信道的角度出发在单片机上研究该算法的安全性, 提出了针对该算法的相关性能量攻击方法. 首先, 对 SNOW3G 的算法实现进行分析, 找到算法中存在能量泄漏的操作, 然后...

Full description

Saved in:
Bibliographic Details
Published inJournal of Cryptologic Research Vol. 9; no. 6; p. 1141
Main Authors WANG, Zheng, ZHANG, Chi, Da-Wu, GU, Xiao-Lin, ZHANG, LU, Yan, Yi-Dong, YUAN, 王铮, 张驰, 谷大武, 张效林, 卢岩, 原义栋
Format Journal Article
LanguageChinese
Published Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 01.12.2022
Subjects
Online AccessGet full text

Cover

Loading…
Abstract SNOW3G 是由 ETSI/SAGE 于 2006 年基于 SNOW2.0 设计的流密码算法, 已被 3GPP 采纳为国际加密标准, 并在 4G/5G 移动通信中作为数据机密性算法和数据完整性算法的核心算法使用. 已有大量研究工作证明了 SNOW3G 算法足以抵御传统的密码分析攻击, 但很少有工作对该算法的具体实现进行分析, 验证算法抵抗侧信道攻击的能力. 本文以 3GPP 标准中 SNOW3G 的算法实现为研究对象, 从侧信道的角度出发在单片机上研究该算法的安全性, 提出了针对该算法的相关性能量攻击方法. 首先, 对 SNOW3G 的算法实现进行分析, 找到算法中存在能量泄漏的操作, 然后根据算法中密钥与该操作间的联系制定合理的攻击策略, 最终恢复出算法的密钥. 通过实验对提出的相关性能量攻击方法进行了验证, 结果表明, 在装有 ATMega128A 芯片的单片机上, 利用该方法仅需使用2000条能量消耗曲线即可在 1 小时内完整恢复出算法的密钥.
AbstractList SNOW3G 是由 ETSI/SAGE 于 2006 年基于 SNOW2.0 设计的流密码算法, 已被 3GPP 采纳为国际加密标准, 并在 4G/5G 移动通信中作为数据机密性算法和数据完整性算法的核心算法使用. 已有大量研究工作证明了 SNOW3G 算法足以抵御传统的密码分析攻击, 但很少有工作对该算法的具体实现进行分析, 验证算法抵抗侧信道攻击的能力. 本文以 3GPP 标准中 SNOW3G 的算法实现为研究对象, 从侧信道的角度出发在单片机上研究该算法的安全性, 提出了针对该算法的相关性能量攻击方法. 首先, 对 SNOW3G 的算法实现进行分析, 找到算法中存在能量泄漏的操作, 然后根据算法中密钥与该操作间的联系制定合理的攻击策略, 最终恢复出算法的密钥. 通过实验对提出的相关性能量攻击方法进行了验证, 结果表明, 在装有 ATMega128A 芯片的单片机上, 利用该方法仅需使用2000条能量消耗曲线即可在 1 小时内完整恢复出算法的密钥.
Author Da-Wu, GU
Xiao-Lin, ZHANG
原义栋
ZHANG, Chi
WANG, Zheng
LU, Yan
张驰
王铮
卢岩
Yi-Dong, YUAN
张效林
谷大武
Author_xml – sequence: 1
  givenname: Zheng
  surname: WANG
  fullname: WANG, Zheng
– sequence: 2
  givenname: Chi
  surname: ZHANG
  fullname: ZHANG, Chi
– sequence: 3
  givenname: GU
  surname: Da-Wu
  fullname: Da-Wu, GU
– sequence: 4
  givenname: ZHANG
  surname: Xiao-Lin
  fullname: Xiao-Lin, ZHANG
– sequence: 5
  givenname: Yan
  surname: LU
  fullname: LU, Yan
– sequence: 6
  givenname: YUAN
  surname: Yi-Dong
  fullname: Yi-Dong, YUAN
– sequence: 7
  fullname: 王铮
– sequence: 8
  fullname: 张驰
– sequence: 9
  fullname: 谷大武
– sequence: 10
  fullname: 张效林
– sequence: 11
  fullname: 卢岩
– sequence: 12
  fullname: 原义栋
BookMark eNrjYmDJy89LZWCQMjTQMzS2MLPQz9JLzsvO1MtKLtIzMDAwNTdmYeA0MrA01zUxNDTjYOAtLs5MMjA1NTO2MDIx5GTQfzmp4-n6nQrBfv7hxu4Kz7Y2Pl3f9nxB4_N1059tnvp8VsuTfcuf7F_4snHy0462Z_Mm8DCwpiXmFKfyQmluhlA31xBnD10ff3dPZ0cf3QJDIwtj3ZRkw-Q0S8tEIG1sYJKaZpJimJKUZmpuYGRiZG6YaGhpkmhskmgElEtKMzdINE40MzBLTTQySkk1sUw0TzMx5mZQhphbUJRfWJpaXBKflV9alAe0Mt7IwsLE0tzS0sLEGAAdsFNS
ContentType Journal Article
Copyright 2022. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2022. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID JQ2
DOI 10.13868/j.cnki.jcr.000573
DatabaseName ProQuest Computer Science Collection
DatabaseTitle ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection
DeliveryMethod fulltext_linktorsrc
GroupedDBID -SI
-S~
ALMA_UNASSIGNED_HOLDINGS
CAJEI
JQ2
PB1
PB9
Q--
ID FETCH-LOGICAL-p1283-dc1cf99adc1304ef4d1dbf57024271a194a34a2304bf70a3a606ea22de49a7f43
ISSN 2097-4116
IngestDate Mon Jun 30 15:01:03 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 6
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p1283-dc1cf99adc1304ef4d1dbf57024271a194a34a2304bf70a3a606ea22de49a7f43
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2884979984
PQPubID 6503834
ParticipantIDs proquest_journals_2884979984
PublicationCentury 2000
PublicationDate 2022-12-01
PublicationDateYYYYMMDD 2022-12-01
PublicationDate_xml – month: 12
  year: 2022
  text: 2022-12-01
  day: 01
PublicationDecade 2020
PublicationPlace Beijing
PublicationPlace_xml – name: Beijing
PublicationTitle Journal of Cryptologic Research
PublicationYear 2022
Publisher Chinese Association for Cryptologic Research, Journal of Cryptologic Research
Publisher_xml – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research
SSID ssib055638241
ssib058688234
Score 2.2993503
Snippet SNOW3G 是由 ETSI/SAGE 于 2006 年基于 SNOW2.0 设计的流密码算法, 已被 3GPP 采纳为国际加密标准, 并在 4G/5G 移动通信中作为数据机密性算法和数据完整性算法的核心算法使用. 已有大量研究工作证明了 SNOW3G 算法足以抵御传统的密码分析攻击,...
SourceID proquest
SourceType Aggregation Database
StartPage 1141
SubjectTerms Algorithms
Cryptography
Power consumption
Title 针对 SNOW3G 流密码算法的侧信道分析
URI https://www.proquest.com/docview/2884979984
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLdKd-GCQID42FAP-DRlS_yR2Me0SqlQ6RC0WsWlcr7UDqmbSnvYbpXQtCMCISQOCE7c2AFx4DL-mbXV_guek_QDVj4vjvUc20ney_PP9nvPCN3ldkxjW3KD-5wbzHdCwzet2KAwHTKtSDCWBDB9ULMrDXa_yZu53MmC1dKg728EB0v9Sv6Hq0ADvmov2X_g7KxRIEAe-AspcBjSv-Ix9iSWBAuBPY7dMi7K9ce1rW16bx17Ni5ygIlZibCx52DXTCiQ8bB0knsollxTpIsFwx7DRQ-7TpIpY9fSPUAVSXU70I9ux8YSqpu_gLWl3v5eP9WoM7O-meZ3Uw-pJ-0oGzD1knUlo5banfm6ubE9SJbsG1NSs6N2jWoa8SCpsrheQchPth_6WPBIx1yZS19iULns6dJNhD-_QKIuiSkdg1mp5-ZUt8sFEV7U0zALtJYOIFTYIhlBgu7TzsZO0NMBLnl62sqP0bprW61yo1pt1b1m_QJaITBNIXm0UvRqDx9NNZqOvibIHHByaF2QxNRh9riZJ5fuePNct-cQQgJ76pfRpey7FNxU-K6g3EH7Kto8e3k0Ov5aSIWtMP4yHB0fTt4PJ5_ejD-_nrx9fnry8fTbh7Phq9HR4fjdi2uoUfbqpYqRnbxh7AFeoUYYWEEspYIrNVkUs9AK_Zg7GtA5lrIkU5QpvZ_gx46pqIJpcKQICSMmlRMzeh3lu7vd6AYqUBlZcRgwymIbwLoUKqJKsUj4TAkA_zfR6vQNW9mv9axFhGB6v1mwW78vvo0uzmVsFeX7vUG0Biix79_JWPEddu5jBA
linkProvider ProQuest
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E9%92%88%E5%AF%B9+SNOW3G+%E6%B5%81%E5%AF%86%E7%A0%81%E7%AE%97%E6%B3%95%E7%9A%84%E4%BE%A7%E4%BF%A1%E9%81%93%E5%88%86%E6%9E%90&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=WANG%2C+Zheng&rft.au=ZHANG%2C+Chi&rft.au=Da-Wu%2C+GU&rft.au=Xiao-Lin%2C+ZHANG&rft.date=2022-12-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=9&rft.issue=6&rft.spage=1141&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000573&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon