研究課題/領域番号 |
20K19798
|
研究種目 |
若手研究
|
配分区分 | 基金 |
審査区分 |
小区分60070:情報セキュリティ関連
|
研究機関 | 電気通信大学 |
研究代表者 |
李 陽 電気通信大学, 大学院情報理工学研究科, 准教授 (20821812)
|
研究期間 (年度) |
2020-04-01 – 2024-03-31
|
研究課題ステータス |
交付 (2022年度)
|
配分額 *注記 |
4,290千円 (直接経費: 3,300千円、間接経費: 990千円)
2023年度: 650千円 (直接経費: 500千円、間接経費: 150千円)
2022年度: 1,170千円 (直接経費: 900千円、間接経費: 270千円)
2021年度: 1,300千円 (直接経費: 1,000千円、間接経費: 300千円)
2020年度: 1,170千円 (直接経費: 900千円、間接経費: 270千円)
|
キーワード | side-channel attack / screaming channel / AES / Side-Channel Attack / Range SCA / IoT Devices / Key Recovery / IoT / Distance |
研究開始時の研究の概要 |
This research will conduct a security evaluation of distance side-channel attacks for network-enabled devices for the Internet of Things, to reveal the leakage mechanism, to understand the relations between close attacks and distance attacks, and to propose reasonable countermeasures.
|
研究実績の概要 |
This year, our research has yielded 2 achievements. Firstly, we developed two key recovery methods, based on the unique leakage model we discovered for the screaming channel. These methods leverage different assumptions about the leakage models, leading to the design of second-round attacks and final round key recovery method. In the experiment, we've seen a considerable enhancement in attack efficiency compared to previous methodologies. In particular, for the second-round attack, we capitalized on the similarity of leakages when the most significant 4 bits of the S-box input are the same. We devised a chosen-plaintext attack that employs the variance of the traces as a distinguisher, enabling independent key byte recovery. Our results indicated that the key could be retrieved with fewer than 200 plaintexts. For the final round attack, we utilized the Hamming weight of the most significant 4 bits of the S-box input to facilitate key recovery, resulting in a further boost in efficiency. These findings were published at SCIS 2023. Secondly, we investigated the conditions that trigger different leakage profiles. We discovered that the specific leakage observed in the screaming channel is connected to the memory employed in calculations. By altering the location of the S-box table, we can manipulate the leakage profiles for the information leakage.
|
現在までの達成度 (区分) |
現在までの達成度 (区分)
2: おおむね順調に進展している
理由
We've made expected progress in our research plan, having carried out a successful remote attack, from measurement to key recovery, across various distances to the target. We've also managed to discern the differences in leakage between Bluetooth-based radio signals and near-field electromagnetic radiation. Importantly, we've refined the existing screaming channel attack, reducing the requirements for the attack and enhancing its efficiency. Now, our focus is pivoting towards understanding the root cause of these different leakage profiles, which could potentially provide valuable guidance for future implementations.
|
今後の研究の推進方策 |
Our research scheme will continue as originally planned, with this year's emphasis being as follows: Firstly, we will continue to clarify the mechanism of differences in the leakage model for the screaming channel. In order to validate some of our hypotheses, we will make changes to certain implementation methods and observe the changes in the leakage model, which could help us determine the conditions under which special leakage models occur. Subsequently, we will use programs specifically to test the conditions for the occurrence of special leakage profiles. Secondly, we will organize our existing achievements and compile them into a research paper.
|