首页|轻量级密码Pyjamask和SUNDAE-GIFT的不可能统计故障分析

轻量级密码Pyjamask和SUNDAE-GIFT的不可能统计故障分析

扫码查看
Pyjamask密码是2020年由Goudarzi等学者在国际对称密码学期刊中提出的密码算法,同时也是国际轻量级密码竞赛第二轮候选算法,旨在保护物联网中传感器、智能芯片和嵌入式设备的数据安全.本文结合Pyjamask密码的设计结构和实现特点,基于不可能关系策略和统计分析,提出适用于在唯密文环境下的不可能统计故障分析方法,并设计了 Wasserstein距离-汉明重量和Wasserstein距离-极大似然估计区分器.该分析方法分别仅需1024和1120个随机故障密文,即可在59.84ms和140.16ms内破译Pyjamask密码全部版本的128比特主密钥.并且,该方法和区分器均可用于认证加密算法SUNDAE-GIFT的分析中.不可能统计故障分析的攻击速度快,并且实现代价低,为轻量级密码的实现安全研究提供了有价值的参考.
Impossible Statistical Fault Analysis of the Pyjamask and SUNDAE-GIFT Lightweight Cryptosystems
The lightweight cryptosystems Pyjamask and SUNDAE-GIFT,proposed in the IACR Transactions on Symmetric Cryptology,are candidates for the second round of Lightweight Cryp-tography Standardization.They aim to protect the data of sensors,smart chips,and embedded devices on the Internet of Things.The Pyjamask block cipher adopts a substitution-permutation network and consists of two versions:Pyjamask-96 and Pyjamask-128,whose block sizes are 96 and 128 bits,respectively.Its key size is 128bits,with 14 rounds of encryption or decryption.It has perfect diffusion and compatibility and can resist many types of attacks,such as side-channel analysis,differential analysis,linear analysis,impossible differential analysis,Boomerang analysis,integral analysis,algebraic higher-order differential analysis,etc.The SUNDAE-GIFT authenticated encryption lies on a GIFT block cipher with a 128-bit secret key,128-bit blocks,and 40 rounds of encryption or decryption.It provides confidentiality and authentication,and its security analysis includes typical fault analysis and traditional cryptanalysis.This study presents the Pyjamask and SUNDAE-GIFT lightweight cryptosystems against a new impossible statistical fault analysis.It is based on the basic assumption of a ciphertext-only attack and combines an impossible relationship with statistical analysis.In addition,this study constructs novel distinguishers of Wasserstein Distance-Hamming Weight(WD-HW)and Wasserstein Distance-Maximum Likelihood Estimation(WD-MLE)based on the Wasserstein distance.The attackers can inject random nibble faults to filter out some bits of the round keys through the impossible and statistical relationships.They can obtain all round keys to recover the secret key through successive fault injections and the key schedule.The experiments consider the number of faults,accuracy,reliability,latency,and complexity to study the performance of the new fault analysis and distinguishers.The number of faults is the minimum required for retrieving the secret key with the maximum probability.The smaller the faults,the better the attacking performance and the distinguisher.Accuracy is measured using root mean square error.The smaller the value of RMSE,the closer the prediction results are to the accurate results.Reliability refers to the probability of recovering the secret key.When the reliability reaches no less than 99%,the attacker can recover the secret key in most cases.Latency is the time required to retrieve the secret key using different distinguishers.The com-plexity serves as metrics to assess the computational time and total data processed required for recovery the key.In practice,latency and complexity are important indicators for measuring the performance of fault analysis and distinguishers.In this paper,the experimental results show that neither Pyjamask nor SUNDAE-GIFT can resist the proposed impossible statistical fault analysis.The analysis requires only 1024 and 1120 random fault ciphertexts to recover the secret keys of Pyjamask-96 and Pyjamask-128 in 59.84 and 140.16 milliseconds,respectively.In addition,the analysis requires only 400 faults to recover the 128-bit secret key of SUNDAE-GIFT in 5.78 seconds.Compared with the classical statistical fault analysis,the impossible statistical fault analysis performs better.It can reduce the attacking cost and improve the attacking effectiveness of lightweight cryptosystems.As a result,the impossible statistical fault analysis threatens the security of the Pyjamask and SUNDAE-GIFT lightweight cryptosystems.This study provides a valuable reference for securing lightweight cryptosystems in the Internet of Things.

lightweight cryptosystemPyjamaskSUNDAE-GIFTfault analysisimpossible relationshipcryptanalysis

李玮、高建宁、谷大武、秦梦洋、刘源

展开 >

东华大学计算机科学与技术学院 上海 201620

上海交通大学计算机科学与工程系 上海 200240

上海交通大学上海市可扩展计算与系统重点实验室 上海 200240

上海交通大学上海市信息安全综合管理技术研究重点实验室 上海 200240

展开 >

轻量级密码 Pyjamask SUNDAE-GIFT 故障分析 不可能关系 密码分析

国家重点研发计划国家自然科学基金上海市扬帆计划上海市扬帆计划

2020YFA07123006207230721YF140120023YF1401000

2024

计算机学报
中国计算机学会 中国科学院计算技术研究所

计算机学报

CSTPCD北大核心
影响因子:3.18
ISSN:0254-4164
年,卷(期):2024.47(5)
  • 9