引用本文: | 王晨旭,赵占锋,喻明艳,王进祥,姜佩贺.Piccolo相关性功耗分析攻击技术研究[J].哈尔滨工业大学学报,2013,45(9):17.DOI:10.11918/j.issn.0367-6234.2013.09.004 |
| WANG Chenxu,ZHAO Zhanfeng,YU Mingyan,WANG Jinxiang,JIANG Peihe.Research on correlation power analysis attack against Piccolo[J].Journal of Harbin Institute of Technology,2013,45(9):17.DOI:10.11918/j.issn.0367-6234.2013.09.004 |
|
摘要: |
为了评测轻量级密码算法Piccolo抗功耗分析攻击的能力, 提出一种针对首轮的功耗分析攻击模型, 搭建了功耗模拟采集平台, 对该算法进行了相关性功耗分析攻击. 针对Piccolo算法首轮运算中包含白化密钥和轮置换操作的特点, 将首轮相关攻击密钥(包括轮密钥RK0L、RK0R、WK0、WK1)分成6段子密钥, 逐个完成各段子密钥的攻击, 将80位种子密钥的搜索空间从280降低到(2×220+2×24+2×28+216), 使种子密钥的恢复成为可能. 攻击结果表明, 只需500条功耗曲线即可恢复首轮攻击密钥, 由此可见, 未加任何防护措施的Piccolo硬件实现极易遭受相关性功耗分析攻击, 研究并采取切实有效的防护措施势在必行. 据现有资料, 这是首次评估Piccolo密码算法在相关性功耗分析攻击方面的安全性. |
关键词: 轻量级密码算法 Piccolo 相关性功耗分析 功耗分析攻击模型 防护措施 |
DOI:10.11918/j.issn.0367-6234.2013.09.004 |
分类号: |
基金项目:国家自然科学基金资助项目(60973162). |
|
Research on correlation power analysis attack against Piccolo |
WANG Chenxu1,2, ZHAO Zhanfeng2, YU Mingyan1, WANG Jinxiang1, JIANG Peihe2
|
(1. Microelectronics Center, Harbin Institute of Technology, 150001 Harbin, China;2. School of Information & Electrical Engineering, Harbin Institute of Technology, 264209 Weihai, Shandong, China)
|
Abstract: |
To evaluate an ultra-lightweight blockcipher Piccolo’s ability to counteract Power Analysis Attack (PAA), an attack model, which focuses on the first round of Piccolo, was proposed and Correlation Power Analysis (CPA) was conducted on this cipher based on a power simulation acquisition platform. Due to the whiten keys and round permutation for the first round of Piccolo, attacking keys including RK0L, RK0R, WK0 and WK1 were divided into six sub-keys, which were disclosed one by one. This approach can reduce the 80-bit primary key search space from 280 to (2×220+2×24+2×28+216) and make it possible to recover the primary key. The attack results show that 500 power traces are enough to recover Piccolo’s 80-bit primary key. It is concluded that the hardware implementation of Piccolo without any countermeasure is vulnerable to CPA and some countermeasures should be used. This work is the first known report about the security of Piccolo against PAA. |
Key words: lightweight blockcipher Piccolo correlation power analysis(CPA) power analysis attack model countermeasure
|