Page 383 - 《软件学报》2025年第5期
P. 383

李玮 等: 基于代数关系的轻量级密码          DEFAULT  统计故障分析                                     2283


                 5   总 结

                    本文研究了     DEFAULT  密码的中间状态统计分布和多轮密钥之间的代数关系, 提出了基于代数关系的统计故
                 障分析方法, 并结合      AD  检验, 讨论了新型组合区分器        AD-SEI、AD-MLE  和  AD-HW  的性能. 该研究不仅能够以
                 99%  及以上的成功率破译该       DEFAULT  密码, 而且能够降低破译密钥的故障数和复杂度, 减少破译时间. 研究结果
                 表明, 基于代数关系的统计故障分析可以对              DEFAULT  密码的安全性产生威胁. 下一步的研究将结合该密码内部
                 更深轮数进行安全分析.

                 References:
                  [1]  Ahmed T, Samima S, Zuhair M, Ghayvat H, Khan MA, Kumar N. FIMBISAE: A multimodal biometric secured data access framework
                     for Internet of Medical Things ecosystem. IEEE Internet of Things Journal, 2023, 10(7): 6259–6270. [doi: 10.1109/JIOT.2022.3225518]
                  [2]  Wang CY, Wang D, Duan YH, Tao XF. Secure and lightweight user authentication scheme for cloud-assisted Internet of Things. IEEE
                     Trans. on Information Forensics and Security, 2023, 18: 2961–2976. [doi: 10.1109/TIFS.2023.3272772]
                  [3]  Omolara AE, Alabdulatif A, Abiodun OI, Alawida M, Alabdulatif A, Alshoura WH, Arshad H. The Internet of Things security: A survey
                     encompassing unexplored areas and new insights. Computers & Security, 2022, 112: 102494. [doi: 10.1016/j.cose.2021.102494]
                  [4]  Wang CY, Xie L, Zhao YC, Zhang DQ, Ye BL, Lu SL. Survey on RFID-based battery-less sensing. Ruan Jian Xue Bao/Journal of
                     Software, 2022, 33(1): 297–323 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6344.htm [doi: 10.13328/j.cnki.jos.
                     006344]
                  [5]  Li  WT,  Wang  D,  Wang  P.  Insider  attacks  against  multi-factor  authentication  protocols  for  wireless  sensor  networks.  Ruan  Jian  Xue
                     Bao/Journal of Software, 2019, 30(8): 2375–2391 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5766.htm [doi: 10.
                     13328/j.cnki.jos.005766]
                  [6]  Nagarajan SM, Deverajan GG, Kumaran U, Thirunavukkarasan M, Alshehri MD, Alkhalaf S. Secure data transmission in Internet of
                     Medical  Things  using  RES-256  algorithm.  IEEE  Trans.  on  Industrial  Informatics,  2022,  18(12):  8876–8884.  [doi:  10.1109/TII.2021.
                     3126119]
                  [7]  Fan Q, Chen JH, Shojafar M, Kumari S, He DB. SAKE*: A symmetric authenticated key exchange protocol with perfect forward secrecy
                     for industrial Internet of Things. IEEE Trans. on Industrial Informatics, 2022, 18(9): 6424–6434. [doi: 10.1109/TII.2022.3145584]
                  [8]  Saqib M, Moon AH. A systematic security assessment and review of Internet of Things in the context of authentication. Computers &
                     Security, 2023, 125: 103053. [doi: 10.1016/j.cose.2022.103053]
                  [9]  Song C, Zhang L, Wu WL. General subspace trail cryptanalysis of SPN ciphers. Ruan Jian Xue Bao/Journal of Software, 2023, 34(12):
                     5807–5821 (in Chinese with English abstract). http://www.jos.org.cn/201000-9825/6761.htm [ [doi: 10.13328/j.cnki.jos.006761]
                 [10]  Kang BR, Zhang L, Zhang R, Meng XY, Chen T. Cryptographic algorithms against backdoored pseudorandom number generator. Ruan
                     Jian Xue Bao/Journal of Software, 2021, 32(9): 2887–2900 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5976.
                     htm [doi: 10.13328/j.cnki.jos.005976]
                 [11]  Yang F, Zhang QY, Shi ZP, Guan Y. Survey on software side-channel attacks in trusted execution environment. Ruan Jian Xue Bao/
                     Journal of Software, 2023, 34(1): 381–403 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6501.htm [doi: 10.13328/
                     j.cnki.jos.006501]
                 [12]  Wu WB, Liu Z, Yang H, Zhang JP. Survey of side-channel attacks and countermeasures on post-quantum cryptography. Ruan Jian Xue
                     Bao/Journal of Software, 2021, 32(4): 1165–1185 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6165.htm [doi: 10.
                     13328/j.cnki.jos.006165]
                 [13]  Tang BX, Wang LN, Wang R, Zhao L, Chen QS. General side channel defense schema of motion sensor based on Laplace mechanism.
                     Ruan Jian Xue Bao/Journal of Software, 2019, 30(8): 2392–2414 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/
                     5760.htm [doi: 10.13328/j.cnki.jos.005760]
                 [14]  Boneh D, DeMillo RA, Lipton RJ. On the importance of checking cryptographic protocols for faults. In: Proc. of the 1997 Int’l Conf. on
                     the Theory and Applications of Cryptographic Techniques. Konstanz: Springer, 1997. 37–51. [doi: 10.1007/3-540-69053-0_4]
                 [15]  Ramzanipour H, Vafaei N, Bagheri N. Practical differential fault analysis on CRAFT, a lightweight block cipher. The ISC Int’l Journal of
                     Information Security, 2022, 14(3): 21–31. [doi: 10.22042/isecure.2022.14.3.3]
                 [16]  Rivain  M.  Differential  fault  analysis  on  DES  middle  rounds.  In:  Proc.  of  the  11th  Int’l  Workshop  on  Cryptographic  Hardware  and
                     Embedded Systems. Lausanne: Springer, 2009. 457–469. [doi: 10.1007/978-3-642-04138-9_32]
                 [17]  Derbez P, Fouque PA, Leresteux D. Meet-in-the-middle and impossible differential fault analysis on AES. In: Proc. of the 13th Int’l
                     Workshop on Cryptographic Hardware and Embedded Systems. Nara: Springer, 2011. 274–291. [doi: 10.1007/978-3-642-23951-9_19]
                 [18]  Fuhr T, Jaulmes E, Lomné V, Thillard A. Fault attacks on AES with faulty ciphertexts only. In: Proc. of the 2013 Workshop on Fault
                     Diagnosis and Tolerance in Cryptography. Los Alamitos: IEEE, 2013. 108–118. [doi: 10.1109/FDTC.2013.18]
   378   379   380   381   382   383   384   385   386   387   388