M模式的基于持久性故障的碰撞攻击
Persistent Fault-Based Collision Analysis Against the CCM
M工作模式既可以保证数据的机密性,又能保证数据的完整性。本文首次将PFCA攻击应用于CCM工作模式,基于在OpenSSL加密时使用的Te盒中注入的持久性置零故障,并通过构造出CCM模式加密的输入数据及观测输出结果,继而构造出碰撞链,最终成功地恢复出其使用的密钥。在PC的仿真实验中,本文的攻击可以在平均耗时少于1秒的情况下达到100%的成功率。实验结果表明,即使带有认证的分组密码工作模式,攻击者也可以通过认证模块输出的消息认证码来观测碰撞信息,进而恢复出密钥。
he CCM operating mode can ensure the confidentiality of the data and ensure the integrity of the data.In this paper, the PFCA attack is applied to the CCM operating mode. Based on the persistence of zero faults injected in the Te box used in OpenSSL encryption, and the collision chain is constructed by constructing the input data and observation output of CCM mode encryption.Finally, the key is successfully restored.In the simulation experiment of PC, the attacks of this paper can reach 100% of the success rate at an average time consumption of less than 1 second.The experimental results show that even with authentication block cipher working mode, the attacker can also observe collision information through the message authentication code output by the authentication module, thereby restoring the key.
臧首金、郑世慧
电子对抗
密码学M模式持久性故障攻击ESOpenSSL碰撞攻击
cryptographyMpersistent fault analysisadvanced encryption standardOpenSSLcollision analysis
臧首金,郑世慧.M模式的基于持久性故障的碰撞攻击[EB/OL].(2022-01-05)[2025-08-16].http://www.paper.edu.cn/releasepaper/content/202201-9.点此复制
评论