Page 383 - 《软件学报》2025年第5期
P. 383
李玮 等: 基于代数关系的轻量级密码 DEFAULT 统计故障分析 2283
5 总 结
本文研究了 DEFAULT 密码的中间状态统计分布和多轮密钥之间的代数关系, 提出了基于代数关系的统计故
障分析方法, 并结合 AD 检验, 讨论了新型组合区分器 AD-SEI、AD-MLE 和 AD-HW 的性能. 该研究不仅能够以
99% 及以上的成功率破译该 DEFAULT 密码, 而且能够降低破译密钥的故障数和复杂度, 减少破译时间. 研究结果
表明, 基于代数关系的统计故障分析可以对 DEFAULT 密码的安全性产生威胁. 下一步的研究将结合该密码内部
更深轮数进行安全分析.
References:
[1] Ahmed T, Samima S, Zuhair M, Ghayvat H, Khan MA, Kumar N. FIMBISAE: A multimodal biometric secured data access framework
for Internet of Medical Things ecosystem. IEEE Internet of Things Journal, 2023, 10(7): 6259–6270. [doi: 10.1109/JIOT.2022.3225518]
[2] Wang CY, Wang D, Duan YH, Tao XF. Secure and lightweight user authentication scheme for cloud-assisted Internet of Things. IEEE
Trans. on Information Forensics and Security, 2023, 18: 2961–2976. [doi: 10.1109/TIFS.2023.3272772]
[3] Omolara AE, Alabdulatif A, Abiodun OI, Alawida M, Alabdulatif A, Alshoura WH, Arshad H. The Internet of Things security: A survey
encompassing unexplored areas and new insights. Computers & Security, 2022, 112: 102494. [doi: 10.1016/j.cose.2021.102494]
[4] Wang CY, Xie L, Zhao YC, Zhang DQ, Ye BL, Lu SL. Survey on RFID-based battery-less sensing. Ruan Jian Xue Bao/Journal of
Software, 2022, 33(1): 297–323 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6344.htm [doi: 10.13328/j.cnki.jos.
006344]
[5] Li WT, Wang D, Wang P. Insider attacks against multi-factor authentication protocols for wireless sensor networks. Ruan Jian Xue
Bao/Journal of Software, 2019, 30(8): 2375–2391 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5766.htm [doi: 10.
13328/j.cnki.jos.005766]
[6] Nagarajan SM, Deverajan GG, Kumaran U, Thirunavukkarasan M, Alshehri MD, Alkhalaf S. Secure data transmission in Internet of
Medical Things using RES-256 algorithm. IEEE Trans. on Industrial Informatics, 2022, 18(12): 8876–8884. [doi: 10.1109/TII.2021.
3126119]
[7] Fan Q, Chen JH, Shojafar M, Kumari S, He DB. SAKE*: A symmetric authenticated key exchange protocol with perfect forward secrecy
for industrial Internet of Things. IEEE Trans. on Industrial Informatics, 2022, 18(9): 6424–6434. [doi: 10.1109/TII.2022.3145584]
[8] Saqib M, Moon AH. A systematic security assessment and review of Internet of Things in the context of authentication. Computers &
Security, 2023, 125: 103053. [doi: 10.1016/j.cose.2022.103053]
[9] Song C, Zhang L, Wu WL. General subspace trail cryptanalysis of SPN ciphers. Ruan Jian Xue Bao/Journal of Software, 2023, 34(12):
5807–5821 (in Chinese with English abstract). http://www.jos.org.cn/201000-9825/6761.htm [ [doi: 10.13328/j.cnki.jos.006761]
[10] Kang BR, Zhang L, Zhang R, Meng XY, Chen T. Cryptographic algorithms against backdoored pseudorandom number generator. Ruan
Jian Xue Bao/Journal of Software, 2021, 32(9): 2887–2900 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5976.
htm [doi: 10.13328/j.cnki.jos.005976]
[11] Yang F, Zhang QY, Shi ZP, Guan Y. Survey on software side-channel attacks in trusted execution environment. Ruan Jian Xue Bao/
Journal of Software, 2023, 34(1): 381–403 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6501.htm [doi: 10.13328/
j.cnki.jos.006501]
[12] Wu WB, Liu Z, Yang H, Zhang JP. Survey of side-channel attacks and countermeasures on post-quantum cryptography. Ruan Jian Xue
Bao/Journal of Software, 2021, 32(4): 1165–1185 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6165.htm [doi: 10.
13328/j.cnki.jos.006165]
[13] Tang BX, Wang LN, Wang R, Zhao L, Chen QS. General side channel defense schema of motion sensor based on Laplace mechanism.
Ruan Jian Xue Bao/Journal of Software, 2019, 30(8): 2392–2414 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/
5760.htm [doi: 10.13328/j.cnki.jos.005760]
[14] Boneh D, DeMillo RA, Lipton RJ. On the importance of checking cryptographic protocols for faults. In: Proc. of the 1997 Int’l Conf. on
the Theory and Applications of Cryptographic Techniques. Konstanz: Springer, 1997. 37–51. [doi: 10.1007/3-540-69053-0_4]
[15] Ramzanipour H, Vafaei N, Bagheri N. Practical differential fault analysis on CRAFT, a lightweight block cipher. The ISC Int’l Journal of
Information Security, 2022, 14(3): 21–31. [doi: 10.22042/isecure.2022.14.3.3]
[16] Rivain M. Differential fault analysis on DES middle rounds. In: Proc. of the 11th Int’l Workshop on Cryptographic Hardware and
Embedded Systems. Lausanne: Springer, 2009. 457–469. [doi: 10.1007/978-3-642-04138-9_32]
[17] Derbez P, Fouque PA, Leresteux D. Meet-in-the-middle and impossible differential fault analysis on AES. In: Proc. of the 13th Int’l
Workshop on Cryptographic Hardware and Embedded Systems. Nara: Springer, 2011. 274–291. [doi: 10.1007/978-3-642-23951-9_19]
[18] Fuhr T, Jaulmes E, Lomné V, Thillard A. Fault attacks on AES with faulty ciphertexts only. In: Proc. of the 2013 Workshop on Fault
Diagnosis and Tolerance in Cryptography. Los Alamitos: IEEE, 2013. 108–118. [doi: 10.1109/FDTC.2013.18]