登录 | 注册 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
适用于受限设备的轻量级密码综述
  • 摘要

    随着物联网的快速发展,受限设备的安全性受到了严重的挑战,轻量级密码作为受限设备的主要安全措施受到越来越多研究人员的关注.针对轻量级密码的设计策略、安全性和实现性能问题的研究进展作了综述.阐述了轻量级密码常用的设计策略及设计中的关键问题,并对当前典型和常见的轻量级密码从原理、实现机制等诸多方面进行了分析和讨论.归纳总结了轻量级密码安全分析的常用方法,并强调了旁路攻击的威胁与加入防护机制时应注意的问题;从轻量级密码性能的各项重要指标的角度详细对比和分析了现有的轻量级密码算法,指出了面向硬件和面向软件实现的轻量级密码各自适用的场合;最后进一步指明了当前轻量级密码研究中尚未解决的一些难题和未来可能发展的方向.结合轻量级密码自身特征和其应用的环境等特点,指出轻量级密码安全性和实现性能的综合评估是未来值得不断深入研究的问题.

  • 作者

    杨威  万武南  陈运  张言涛  YANG Wei  WAN Wunan  CHEN Yun  ZHANG Yantao 

  • 作者单位

    成都信息工程学院信息安全工程学院,成都,610225/成都信息工程学院应用密码学研究所,成都,610225

  • 刊期

    2014年7期 ISTIC PKU

  • 关键词

    轻量级密码  安全分析  性能评估  受限设备  LightWeight Cryptography (LWC)  cryptanalysis  performance evaluation  constrained device 

参考文献
  • [1] 王晨旭,赵占锋,喻明艳,王进祥,姜佩贺. Piccolo相关性功耗分析攻击技术研究. 哈尔滨工业大学学报, 2013,09
  • [2] 张雷,谷大武,郭筝,赵建杰. KATAN32相关功耗分析及其实现. 计算机应用, 2011,02
  • [3] WU W,FAN W,ZHANG L.Research progress of lightweight block cipher[C]//Chinese Cryptology Development Report.Beijing:Publishing House of Electronics Industry,2010:140-159.(吴文玲,范伟杰,张蕾.轻量级分组密码研究进展【C】//中国密码学发展报告2010.北京:电子工业出版社,2010:140-159.). 2010
  • [4] ZHANG F,ZHAO X,GUO S,et al.Improved algebraic fault analysis:a case study on Piccolo and applications to other lightweight block ciphers[EB/OL].【2014-03-05】.http://www.eng.uconn.edu/~zshi/publications/zhang13_improved_ afa.pdf.. 2014
  • [5] ZHAO X,GUO S,ZHANG F,et al.Improving and evaluating differential fault analysis on LED with algebraic techniques[C]//Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography.Piscataway:IEEE,2013:41-51.. 2013
  • [6] JOVANOVIC P,KREUZER M,POLIAN I.An algebraic fault attack on the LED block cipher[EB/OL].【2014-03-06】.https://eprint.iacr.org/2012/400.pdf.. 2014
  • [7] YANGL,WANGM,QIAOS.Side channel cube attack on PRESENT[C]//Proceedings of the 8th International Conference on Cryptology and Network Security,LNCS 5888.Berlin:SpringerVerlag,2009:379-391.. 2009
  • [8] POSCHMANN A,MORADI A,KHOO K,et al.Side-channel resistant crypto for less than 2 300 GE[J].Journal of Cryptology,2011,24(2):322-345.. 2011
  • [9] MORADI A,POSCHMANN A,LING S,et al.Pushing the limits:a very compact and a threshold implementation of AES[C]//Proceedings of the 30th Annual International Conference on Theory and Applications of Cryptographic Techniques,LNCS 6632.Berlin:Springer-Vedag,2011:69-88.. 2011
  • [10] LEANDER G,PAAR C,POSCHMANN A,et al.New lightweight DES variants[C]//Fast Software Encryption,LNCS 4595.Berlin:Springer-Verlag,2007:196-210.. 2007
  • [11] de CANNIERE C,DUNKELMAN O,KNEZEVIC M.KATAN and KTANTAN-a family of small and efficient hardware-oriented block ciphers[C]//Proceedings of the 11 th International Workshop on Cryptographic Hardware and Embedded Systems,LNCS 5747.Berlin:Springer-Verlag,2009:272-288.. 2009
  • [12] BOGDANOV A,KNEZEVIC M,LEANDER G,et al.SPONGENT:a lightweight hash function[EB/OL].【2013-12-26】.http://homes.esat.kuleuven.be/~abogdano/papers/spongent _ches11.pdf.. 2013
  • [13] ZHANG L,WU W,WEN Q.Stream ciphers research status and prospect of algebraic attacks[J].Journal of Communications,2006,27(1):91-98.(张龙,吴文玲,温巧燕.流密码代数攻击的研究现状及其展望[J].通信学报,2006,27(1):91-98.). 2006
  • [14] ARORA A,PRIVANKA,PAL S K.A survey of cryptanalytic attacks on lightweight block ciphers[J].International Journal of Computer Science and Information Technology and Security,2012,2(2):472-481.. 2012
  • [15] ALIZADEH M,SALLEB M,ZAMANI M,et al.Security and performance evaluation of lightweight cryptographic algorithms in RFID[EB/OL].【2014-01-02】.http://www.wseas.us/e-library/conferences/2012/Kos/COMCOM/COMCOM-03.pdf.. 2014
  • [16] BAR-EI H.Introduction to side channel attacks[EB/OL].【2013-11-10】.http://gauss.ececs.uc.edu/Courses/c653/lectures/SideC/intro.pdf.. 2013
  • [17] SAARINEN M J O.The BlueJay ultra-lightweight hybrid cryptosystem[C]//Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops.Piscataway:IEEE,2012:27-32.. 2012
  • [18] BOGDANOV A,LEANDER G,PAAR C,et al.Hash functions and RFID tags:Mind the gap[EB/OL].【2013-12-23】.http://www.iacr.org/archive/ches2008/51540279/51540279.pdf.. 2013
  • [19] O'NEILL M.Low-cost SHA-1 hash function architecture for RFID tags[C]//Proceedings of the Conference on RFID Security.Malaga:Workshop on RFID Security,2008:41-51.. 2008
  • [20] FELDHOFER M,RECHBERGER C.A case against currently used hash functions in RFID protocols[C]//Proceedings of the 2006 International Conference on the Move to Meaningful Internet Systems,LNCS4277.Berlin:Springer-Verlag,2006:372-381.. 2006
  • [21] GONG Z,NIKOVA S,LAW Y W.KLEIN:a new family of lightweight block ciphers[EB/OL].【2013-10-24】.http://www.metu.edu.tr/~e132713/Klein.pdf.. 2013
  • [22] SHIBUTANI K,ISOBE T,HIWATARI H,et al.Piccolo:an ultra-lightweight blockcipher[C]//Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems,LNCS6917.Berlin:Springer-Verlag,2011:342-357.. 2011
  • [23] HAMALAINEN P,ALHO T,HANNIKAINEN M,et al.Design and implementation of low-area and low-power AES encryption hardware core[C]//Proceedings of the 9th EUROMICRO Conference on Digital System Design.Washington,DC:IEEE Computer Society,2006:577-583.. 2006
  • [24] HELL M,JOHANSSON T,MEIER W.Grain:a stream cipher for constrained environments[J].International Journal of Wireless and Mobile Computing,2007,2(1):86-93.. 2007
  • [25] BABBAGE S,DODD M.The stream cipher MICKEY 2.0[EB/OL].【2013-11-06】.https://www.cosic.esat.kuleuven.be/ecrypt/stream/p2ciphers/mickey/mickey_p2.pdf.. 2013
  • [26] de CANNIERE C.Trivium:a stream cipher construction inspired by block cipher design principles[C]//Proceedings of the 9th International Conference on Information Security,LNCS 4716.Berlin:Springer-Verlag,2006:171-186.. 2006
  • [27] LUO Y,CHAI Q,GONG G,et al.A lightweight stream cipher WG-7 for RFID encryption and authentication[C]//Proceedings of the 2010 IEEE Global Telecommunications Conference.Piscataway:IEEE,2010:1-6.. 2010
  • [28] DAVID M,RANASINGHE D C,LARSEN T.A2U2:a stream cipher for printed electronics RFID tags[C]//Proceedings of the 2011 IEEE International Conference on RFID.Piscataway:IEEE,2011:176-183.. 2011
  • [29] JUELS A,WEISS A.Authenticating pervasive devices with human protocols[C]//Advances in Cryptology-CRYPTO 2005,LNCS 3621.Heidelberg:Springer,2005:293-308.. 2005
  • [30] POSCHMANN A Y.Lightweight cryptography:Cryptographic engineering for a pervasive world[M].Bochum:Ruhr-University Bochum,2009.. 2009
  • [31] HONG D,SUNG J,HONG S,et al.HIGHT:a new block cipher suitable for low-resource device[C]//Proceedings of the 8th International Conference on Cryptographic Hardware and Embedded Systems,LNCS 4249.Berlin:Springer-Verlag,2006:46-59.. 2006
  • [32] STANDAERT F X,PIRET G,GERSHENFELD N,et al.SEA:a scalable encryption algorithm for small embedded applications[C]//Proceedings of the 7th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications,LNCS 3928.Berlin:Springer-Verlag,2006:222-236.. 2006
  • [33] BOGDANOV A,KNUDSEN L R,LEANDER G,et al.PRESENT:an ultra-lightweight block cipher[C]//Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems,LNCS4727.Berlin:Springer-Vedag,2007:450-466.. 2007
  • [34] AGREN M,HELL M,JOHANSSON T,et al.Grain-128a:a new version of Grain-128 with optional authentication[J].International Journal of Wireless and Mobile Computing,2011,5(1):48-59.. 2011
  • [35] EISENBARTH T,KUMAR S.A survey of lightweight-cryptography implementations[J].IEEE Design and Test of Computers,2007,24(6):522-533.. 2007
  • [36] HOFFSTEIN J,PIPHER J,SILVERMAN J H.NTRU:a ringbased public key cryptosystem[C]//Proceedings of the 3rd International Symposium on Algorithmic Number Theory,LNCS 1423.Berlin:Springer,1998:267-288.. 1998
  • [37] BERTONI G,DAEMEN J,PEETERS M,et al.On the security of the keyed sponge construction[EB/OL].【2013-12-20】.http://sponge.noekeon.org/SpongeKeyed.pdf.. 2013
  • [38] BERGER T P,D'HAYER J,MARQUET K,et al.The GLUON family:a lightweight Hash function family based on FCSRs[EB/OL].【2013-12-26】.http://hal-unilim.archives-ouvertes.fr/docs/00/73/87/81/PDF/FCSR-soft.pdf.. 2013
  • [39] AUMASSON J P,HENZEN L,MEIER W,et al.Quark:A lightweight hash[J].Journal of Cryptology,2013,26(2):313-339.. 2013
  • [40] GUO J,PEYRIN T,POSCHMANN A.The PHOTON family of lightweight hash functions[EB/OL].【2013-12-26】.http://www.ecrypt.eu.org/hash2011/proceedings/hash2011_04.pdf.. 2013
  • [41] BERNSTEIN D J.The Salsa20 family of stream ciphers[EB/OL].【2013-11-02】.http://citeseerx.ist.psu.edu/viewdoc/download?doi =10.1.1.64.8844&rep =rep1 &type =pdf.. 2013
  • [42] BERBAIN C,BILLET O,CANTEAUT A,et al.Sosemanuk,a fast software-oriented stream cipher[C]//New Stream Cipher Designs,LNCS 4986.Berlin:Springer-Verlag,2008:98-118.. 2008
  • [43] GUO J,PEVRIN T,POSCHMANN A,et al.The LED block cipher[C]//Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems,LNCS 6917.Berlin:Springer-Vedag,2011:326-341.. 2011
  • [44] WU H.The stream cipher HC-128[M].Berlin:Springer-Verlag,2008:39-47.. 2008
  • [45] BOESGAARD M,VESTERAGER M,PEDERSEN T,et al.Rabbit:a new high-performance stream cipher[C]//Fast Software Encryption,LNCS4936.Berlin:Springer,2003:307-329.. 2003
  • [46] IZADI M,SADEGHIVAN B,SADEGHIAN S S,et al.MIBS:a new lightweight block cipher[C]//Proceedings of the 8th International Conference on Cryptology and Network Security,LNCS 5888.Berlin:Springer-Vedag,2009:334-348.. 2009
  • [47] WU W,ZHANG L.LBlock:a lightweight block cipher[C]//Applied Cryptography and Network Security,LNCS 6715.Berhn:Springer,2011:327-344.. 2011
  • [48] NIKOVA S,RHMEN V,SCHLAFFER M.Secure hardware implementation of nonlinear functions in the presence of glitches[J].Journal of Cryptology,2011,24(2):292-321.. 2011
  • [49] XUE H,ZHAO X,WANG X.Algebraic side-channel attack on LBlock[J].Journal of Huazhong University of Science and Technology:Natural Science Edition,2013,41(6):55-60.(薛红,赵新杰,王小娟.LBlock分组密码代数旁路攻击[J].华中科技大学学报:自然科学版,2013,41(6):55-60.). 2013
  • [50] MANIFAVAS C,HATZIVASILIS G,FVSARAKIS K,et al.Lightweight cryptography for embedded systems-a comparative analysis[EB/OL].【2013-12-20】.http://fysarakis.com/uploads/2/0/6/3/20637656/SETOP2013-Paper-5 b.pdf.. 2013
查看更多︾
相似文献 查看更多>>
34.226.244.70