|
|
Chosen-IV Correlation Power Analysis Attack of ZUC Stream Cipher |
Yan Ying-jian① Yang Chang-sheng① Li Wei①② Zhang Li-chao①③ |
①(PLA Information Engineering University, Zhengzhou 450000, China)
②(Institute of Microelectronics, Fudan University, Shanghai 200433, China)
③(Institute of Electronic Information Engineering, Tianjin University, Tianjin 300072, China) |
|
|
Abstract To analyze the immunity of ZUC stream cipher in aspect of correlation power analysis attack, some relevant researches are conducted. In order to improve the pertinence of attack, a rapid assessment method of the attack scheme is presented, and accordingly a correlation power analysis scheme of ZUC is proposed. Finally, based on the simulation platform raised by ASIC development environment, the attack scheme is validated. Experiment results turn out that the scheme can successfully attack 48-bit key, confirming that ZUC is unable to resist the correlation power analysis attack, and the proposed assessment method of attack scheme takes effect. Compared with Tang Ming’s experimental, which conducted differential power analysis of ZUC with random initial vectors and observing distinct differential power peak with 5000 initial vectors, the proposed attack scheme only uses 256 initial vectors, and gets better results.
|
Received: 15 December 2014
Published: 09 June 2015
|
|
Corresponding Authors:
Yang Chang-sheng
E-mail: ycs3317@126.com
|
|
|
|
[1] |
Wu H J, Huang T, Phuong H N, et al.. Differential attacks against stream cipher ZUC[C]. Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, 2012: 262-277.
|
[2] |
Zhou C F, Feng X T, and Lin D D. The initialization stage analysis of ZUC v1.5[C]. Proceedings of the 10th International Conference, Sanya, China, 2011: 40-53.
|
[3] |
Gautham S. The stream cipher core of the 3GPP encryption standard 128-EEA3: timing attacks and countermeasures[C]. Proceedings of the 7th International Conference, Beijing, China, 2011: 269-288.
|
[4] |
L afitte F, M arkowitch O, and Vav Heule D. SAT based analysis of LTE stream cipher ZUC[C]. Proceedings of the 6th International Conference on Security of Information and Networks, Aksavay, Turkey, 2013: 110-116.
|
[5] |
关杰, 丁林, 刘树凯. SNOW 3G与ZUC流密码的猜测决定攻击[J]. 软件学报, 2013, 24(6): 1324-1333.
|
|
Guan Jie, Ding Ling, and Liu Shu-kai. Guess and determine attack on SNOW 3G and ZUC[J]. Journal of Software, 2013, 24(6): 1324-1333.
|
[6] |
Tang M, Cheng P P, and Qiu Z L. Differential power analysis on ZUC algorithm [OL]. IACR ePrint. http://eprint.iacr.org/ 2012/299.pdf. 2013-12-01.
|
[7] |
唐明, 高剑, 孙乐昊, 等. 嵌入式平台下ZUC算法的侧信道频域攻击[J]. 山东大学学报(理学版), 2014, 49(9): 29-34.
|
|
Tang Ming, Gao Jian, Sun Le-hao, et al.. Side channel attacks in frequency domain for ZUC algorithm in embedded platform[J]. Journal of Shandong University(Natural Science), 2014, 49(9): 29-34.
|
[8] |
Reddy E K. Overview of the side channel attacks[J]. Advanced Networking and Applications, 2013, 4(6): 1799-1808.
|
[9] |
Paul K, Joshua J, Benjamin J, et al.. Introduction to differential power analysis[J]. Journal of Cryptography Engineering, 2011, 1(1): 5-27.
|
[10] |
汪鹏君, 张跃军, 张学龙. 防御差分功耗分析攻击技术研究[J] 电子与信息学报, 2012, 34(11): 2774-2784.
|
|
Wang Peng-jun, Zhang Yue-jun, and Zhang Xue-long. Research of differential power analysis countermeasures[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2774-2784.
|
[11] |
赵永斌, 胡予濮, 贾艳艳. 一种抵抗能量攻击的线性反馈移位寄存器[J]. 西安电子科技大学学报(自然科学版), 2013, 40(3): 172-179.
|
|
Zhao Yong-bin, Hu Yu-pu, and Jia Yan-yan. New design of LFSR based stream ciphers to resist power attack[J]. Journal of Xidian University (Natural Science), 2013, 40(3): 172-179.
|
[12] |
Kumar S, Lemke K, and Paar C. Some thoughts about implementation properties of stream ciphers[C]. Proceedings of State of the Art of Stream Ciphers Workshop, Brugge, Belgium, 2004: 311-319.
|
[13] |
Stefan M, Elisabeth O, and Thomas P著. 冯登国, 周永斌, 刘继业, 等译. 能量分析攻击[M]. 北京: 科学出版社, 2010: 45-46.
|
[14] |
金晨辉, 郑浩然, 张少武, 等. 密码学[M]. 北京: 高等教育出版社, 2009: 149-150.
|
|
Jin Chen-hui, Zheng Hao-ran, Zhang Shao-wu, et al.. Cryptography[M]. Beijing: Higher Education Press, 2009: 149-150.
|
[15] |
杨昌盛, 于敬超, 严迎建. Grain-128同步流密码的选择初始向量相关性能量攻击[J]. 计算机应用, 2014, 34(5): 1318-1321.
|
|
Yang Chang-sheng, Yu Jing-chao, and Yan Yin-jian. Chosen initial vector correlation power attack on synchronous stream cipher Grain-128[J]. Journal of Computer Applications, 2014, 34(5): 1318-1321.
|
[16] |
Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. document 2: ZUC specification version: 1.5[OL]. ETSI/SAGE Specification. http://www.gsma.com/technicalprojects/wp-content/uploads/2012/04/eea3eia3zucv16.pdf. 2011-01-04.
|
[17] |
刘泽艺, 高能, 屠晨阳, 等. 一种抗能量分析攻击的复合寄存器系统[J]. 密码学报, 2014, 1(5): 411-421.
|
|
Liu Ze-yi, Gao Neng, Tu Chen-yang, et al.. A compound register system against power analysis attack[J]. Journal of Cryptologic Research, 2014, 1(5): 411-421.
|
[18] |
刘会英, 赵新杰, 王韬, 等. 基于汉明重的SMS4密码代数旁路攻击研究[J]. 计算机学报, 2013, 36(6): 1183-1193.
|
|
Liu Hui-yin, Zhao Xin-jie, Wang Tao, et al.. Research on hamming weight-based algebraic side-channel attacks on SMS4[J]. Chinese Journal of Computers, 2013, 36(6): 1183-1193.
|
|
|
|