 |
|
|
|
 |
 |
 |
|
 |
|
 |
|
|
吴伟彬,刘哲,杨昊,张吉鹏.后量子密码算法的侧信道攻击与防御综述.软件学报,2021,32(4):1-0 |
后量子密码算法的侧信道攻击与防御综述 |
Survey of Side-Channel Attacks and Countermeasures on Post-Quantum Cryptography |
投稿时间:2020-05-23 修订日期:2020-08-14 |
DOI:10.13328/j.cnki.jos.006165 |
中文关键词: 后量子密码 侧信道攻击 故障攻击 能量分析攻击 时间攻击 |
英文关键词:Post-Quantum Cryptography Side-Channel Attacks Fault Attack Power Analysis Timing Attack |
基金项目:国家自然科学基金项目(61802180);江苏省自然科学基金(.BK20180421);国家密码发展基金(MMJJ20180105);中央高校基础研究基金(NE2018106) |
|
摘要点击次数: 159 |
全文下载次数: 91 |
中文摘要: |
为解决量子计算对公钥密码安全的威胁,后量子密码成为密码领域的前沿焦点研究问题.后量子密码通过数学理论保证了算法安全性,但在具体实现和应用中易受侧信道攻击,这严重威胁到后量子密码的安全性.本文基于美国NIST第二轮候选算法和中国CACR公钥密码竞赛第二轮的候选算法,针对基于格、基于编码、基于哈希、基于多变量等多种后量子密码算法进行分类调研,分析其抗侧信道攻击的安全性现状和现有防护策略.为了深入分析后量子密码的侧信道攻击方法,按照算法核心算子和攻击类型进行分类,总结了针对各类后量子密码常用的攻击手段、攻击点及攻击评价指标.进一步,根据攻击类型和攻击点,梳理了现有防护策略及相应的开销代价.最后我们在总结部分,根据攻击方法、防护手段和防护代价提出了一些安全建议,并且还分析了未来潜在的侧信道攻击手段与防御方案. |
英文摘要: |
To solve the threat of quantum computing to the security of public-key cryptography, post-quantum cryptography has become a frontier focus in the field of cryptography. Post-quantum cryptography guarantees the security of the algorithm through mathematical theories, but it is vulnerable to side-channel attacks in specific implementation and applications, which will seriously threaten the security of post-quantum cryptography. This paper is based on the round 2 candidates in the NIST post-quantum cryptography standardization process and the round 2 candidates in the CACR public key cryptography competition in China. We first conduct classification investigations of various post-quantum cryptographic algorithms, including lattice-based, code-based, hash-based, and multivariate-based cryptographic algorithms. We then analyze their security status against side-channel attacks and existing protection strategies. To analyze the methods of side-channel attack against post-quantum cryptography, we summarize the commonly used post-quantum cryptography side-channel attack methods, attack targets, and attack evaluation indexes for various post-quantum cryptography according to the classification of core operators and attack types. Furthermore, following the attack types and attack targets, we sorted out the existing countermeasures for attack and the costs of defense strategies. Finally, in the conclusion part, we put forward some security suggestions according to the attack method, protection means, and protection cost, and also analyze the potential side-channel attack methods and defense strategies in the future. |
HTML 下载PDF全文 查看/发表评论 下载PDF阅读器 |
|
|
|
|
|
|
 |
|
|
|
|
 |
|
 |
|
 |
|