论文标题

改进了Simeck密码的故障分析

Improved Fault Analysis on SIMECK Ciphers

论文作者

Le, Duc-Phong, Lu, Rongxing, Ghorbani, Ali A.

论文摘要

物联网(IoT)的进步在分享我们丰富的生活经验方面产生了根本的影响和影响。但是,由于物联网设备通常是资源受限的,因此轻质块密码在作为安全物联网协议的构件中发挥了重要作用。在Ches 2015中,Simeck是一个由密码组成的家族,是为资源受限的IoT设备而设计的。自发布以来,就其安全性进行了许多分析。在本文中,在一个纤利模型下,我们提出了对Simeck Ciphers的新有效的故障分析攻击。与先前报告的攻击相比,我们的攻击只能通过将故障注入所有Simeck家庭成员的一轮来恢复完整的主密钥。该属性至关重要,因为攻击者将故障注射到现实世界中的IoT设备上的Simeck实现的不同回合是不可行的。具体而言,我们的攻击的特征是对正确和错误的立即密文之间的差异跟踪进行深入分析。进行了广泛的仿真评估,结果证明了我们提出的攻击的有效性和正确性。

The advances of the Internet of Things (IoT) have had a fundamental impact and influence in sharping our rich living experiences. However, since IoT devices are usually resource-constrained, lightweight block ciphers have played a major role in serving as a building block for secure IoT protocols. In CHES 2015, SIMECK, a family of block ciphers, was designed for resource-constrained IoT devices. Since its publication, there have been many analyses on its security. In this paper, under the one bit-flip model, we propose a new efficient fault analysis attack on SIMECK ciphers. Compared to those previously reported attacks, our attack can recover the full master key by injecting faults into only a single round of all SIMECK family members. This property is crucial, as it is infeasible for an attacker to inject faults into different rounds of a SIMECK implementation on IoT devices in the real world. Specifically, our attack is characterized by exercising a deep analysis of differential trail between the correct and faulty immediate ciphertexts. Extensive simulation evaluations are conducted, and the results demonstrate the effectiveness and correctness of our proposed attack.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源