后量子密码算法的侧信道攻击与防御综述
CSTR:
作者:
作者单位:

作者简介:

吴伟彬(1996-),男,学士,CCF学生会员,主要研究领域为侧信道攻击与防御,密码工程,后量子密码.
刘哲(1986-),男,博士,教授,博士生导师,CCF专业会员,主要研究领域为密码工程,后量子密码,侧信道攻击与防御.
杨昊(1997-),男,学士,CCF学生会员,主要研究领域为密码工程,后量子密码.
张吉鹏(1999-),学士,主要研究领域为密码工程,后量子密码.

通讯作者:

刘哲,E-mail:zhe.liu@nuaa.edu.cn

中图分类号:

基金项目:

国家自然科学基金(61802180);江苏省自然科学基金(BK20180421);国家密码发展基金(MMJJ20180105);中央高校基础研究基金(NE2018106)


Survey of Side-channel Attacks and Countermeasures on Post-quantum Cryptography
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (61802180); Natural Science Foundation of Jiangsu Province of China (BK20180421); National Cryptography Development Fund (MMJJ20180105); Fundamental Research Funds for the Central Universities (NE2018106)

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    为了解决量子计算对公钥密码安全的威胁,后量子密码成为密码领域的前沿焦点研究问题.后量子密码通过数学理论保证了算法的安全性,但在具体实现和应用中易受侧信道攻击,这严重威胁到后量子密码的安全性.基于美国NIST第2轮候选算法和中国CACR公钥密码竞赛第2轮的候选算法,针对基于格、基于编码、基于哈希、基于多变量等多种后量子密码算法进行分类调研,分析其抗侧信道攻击的安全性现状和现有防护策略.为了深入分析后量子密码的侧信道攻击方法,按照算法核心算子和攻击类型进行分类,总结了针对各类后量子密码常用的攻击手段、攻击点及攻击评价指标.进一步地,根据攻击类型和攻击点,梳理了现有防护策略及相应的开销代价.最后,根据攻击方法、防护手段和防护代价提出了一些安全建议,并且还分析了未来潜在的侧信道攻击手段与防御方案.

    Abstract:

    To solve the threat of quantum computing to the security of public-key cryptography, post-quantum cryptography has become a frontier focus in the field of cryptography. Post-quantum cryptography guarantees the security of the algorithm through mathematical theories, but it is vulnerable to side-channel attacks in specific implementation and applications, which will seriously threaten the security of post-quantum cryptography. This study is based on the round 2 candidates in the NIST post-quantum cryptography standardization process and the round 2 candidates in the CACR public key cryptography competition in China. First, classification investigations of various post-quantum cryptographic algorithms are conducted, including lattice-based, code-based, hash-based, and multivariate-based cryptographic algorithms. Then, their security status against side-channel attacks and existing protection strategies are analyzed. To analyze the methods of side-channel attack against post-quantum cryptography, it is summarized that the commonly used post-quantum cryptography side-channel attack methods, attack targets, and attack evaluation indexes for various post-quantum cryptography according to the classification of core operators and attack types. Furthermore, following the attack types and attack targets, the existing countermeasures for attack and the costs of defense strategies are sorted out. Finally, in the conclusion part, some security suggestions are put forward according to the attack method, protection means, and protection cost, and also the potential side-channel attack methods and defense strategies in the future are analyzed.

    参考文献
    相似文献
    引证文献
引用本文

吴伟彬,刘哲,杨昊,张吉鹏.后量子密码算法的侧信道攻击与防御综述.软件学报,2021,32(4):1165-1185

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2020-05-23
  • 最后修改日期:2020-08-14
  • 录用日期:
  • 在线发布日期: 2021-01-22
  • 出版日期: 2021-04-06
文章二维码
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号