Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks

被引:5
|
作者
Luo, Yuling [1 ]
Zhang, Shunsheng [1 ]
Liu, Junxiu [1 ]
Cao, Lvchen [1 ]
机构
[1] Guangxi Normal Univ, Sch Elect Engn, Guangxi Key Lab Multisource Informat Min & Secur, Guilin 541004, Peoples R China
来源
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS | 2020年 / 30卷 / 15期
基金
中国国家自然科学基金;
关键词
Side channel attack; template attack; chaotic block cipher; multivariate Gaussian model; POWER ANALYSIS; ENCRYPTION; CIRCUIT; CIPHER;
D O I
10.1142/S0218127420502235
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The security of chaotic cryptographic system can be theoretically evaluated by using conventional statistical tests and numerical simulations, such as the character frequency test, entropy test, avalanche test and SP 800-22 tests. However, when the cryptographic algorithm operates on a cryptosystem, the leakage information such as power dissipation, electromagnetic emission and time-consuming can be used by attackers to analyze the secret keys, namely the Side Channel Analysis (SCA) attack. In this paper, a cryptanalysis method is proposed for evaluating the security of a chaotic block cryptographic system from a hardware perspective by utilizing the Template Attacks (TAs). Firstly, a chaotic block cryptographic system is described briefly and implemented based on an Atmel XMEGA microcontroller. Then the TA using a multivariate Gaussian model is introduced. In order to reduce computational complexity and improve the efficiency of TA, the Hamming weight is used in this work to model power consumption traces. The proposed TA method has the following advantages including (a) using the sum of difference to select points of interest of traces, (b) using a data processing method to minimize the influences on power information modeling from the redundant sampling points, and (c) all the traces are aligned precisely before establishing the templates. Experimental results show that the TA can be used to attack the chaotic cryptographic systems and is more efficient, i.e. similar to 32% less attack traces than correlation power analysis, when the templates are properly built.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Keystream cryptanalysis of a chaotic cryptographic method
    Alvarez, G
    Montoya, R
    Romera, M
    Pastor, G
    COMPUTER PHYSICS COMMUNICATIONS, 2004, 156 (02) : 205 - 207
  • [2] Cryptanalysis of a Cryptographic Algorithm that Utilizes Chaotic Neural Networks
    Qin, Ke
    Oommen, B. J.
    INFORMATION SCIENCES AND SYSTEMS 2014, 2014, : 167 - 174
  • [3] Reply to the comment "Keystream cryptanalysis of a chaotic cryptographic method"
    Wong, WK
    Lee, LP
    Wong, KW
    COMPUTER PHYSICS COMMUNICATIONS, 2004, 156 (02) : 208 - 208
  • [4] A Chaotic Cryptographic System against Power Analysis Attack
    Luo Y.
    Li T.
    Xiao D.
    Qiu S.
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2022, 49 (04): : 47 - 57
  • [5] A Chaotic Block Cryptographic System Resistant to Power Analysis Attack
    Luo, Yuling
    Zhang, Dezheng
    Liu, Junxiu
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2019, 29 (08):
  • [6] On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks
    Qin, Ke
    Oommen, B. John
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [7] Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks
    Yang, Jiyun
    Liao, Xiaofeng
    Yu, Wenwu
    Wong, Kwok-wo
    Wei, Jun
    CHAOS SOLITONS & FRACTALS, 2009, 40 (02) : 821 - 825
  • [8] Side Channel Attacks Cryptanalysis against Block Ciphers Based on FPGA Devices
    Bechtsoudis, Anestis
    Sklavos, Nicolas
    IEEE ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2010), 2010, : 460 - 461
  • [9] Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis
    Sakurai, K
    Zheng, YL
    ALGORITHMS AND COMPUTATION, 1996, 1178 : 376 - 385
  • [10] The Analysis of Against Differential Cryptanalysis Attack for Chaotic Block Cipher Based on Feistel Structure
    Zheng, Xiaoli
    Jiang, Digang
    Jiang, Yida
    2013 INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATION INNOVATION (EBMEI 2013), VOL 17, 2013, 17 : 402 - 406