|
计算机科学技术学报 ›› 2019,Vol. 34 ›› Issue (5): 1079-1095.doi: 10.1007/s11390-019-1961-5
所属专题: Computer Networks and Distributed Computing
Chi Zhang1, Jun-Rong Liu1,2, Da-Wu Gu1,*, Distinguished Member, CCF, Member, ACM, Wei-Jia Wang3, Xiang-Jun Lu1, Zheng Guo1,2, Hai-Ning Lu1,4
Chi Zhang1, Jun-Rong Liu1,2, Da-Wu Gu1,*, Distinguished Member, CCF, Member, ACM, Wei-Jia Wang3, Xiang-Jun Lu1, Zheng Guo1,2, Hai-Ning Lu1,4
时分多址(Time-division multiple access,TDMA)和码分多址(code-division multiple access,CDMA)是两种主要的用在数字蜂窝网络中的技术。TDMA网络中的认证协议被证明易受到侧信道分析(side-channel analysis,SCA)的威胁,可利用侧信道分析方法成功恢复出未做侧信道防护的手机卡(subscriber identity module,SIM)中的认证密钥。由于CDMA网络中的认证协议与TDMA网络中的认证协议不同,已提出的在TMDA上的侧信道分析方法无法应用在CDMA网络上。为了填补该项空白,我们深入研究了CDMA网络中的两种认证协议,即基于蜂窝认证与语音加密(cellular authentication and voice encryption,CAVE)的认证协议及基于认证与密钥协商(authentication and key agreement,AKA)的认证协议。这两种协议分别使用CAVE算法和安全散列算法1(secure hash algorithm 1,SHA-1)算法作为他们的基本密码算法模块。我们发现了这两种散列类算法的易受侧信道攻击的脆弱点,提出了完整的基于侧信道分析方法的认证密钥恢复方案。我们在微控制器及商业CDMA手机卡上验证了我们提出的新攻击方案,可使用少量功耗曲线在短时间内完全恢复认证密钥。
[1] Shankar P M. Introduction to Wireless Systems. Wiley, 2002. [2] Sauter M. From GSM to LTE:An Introduction to Mobile Networks and Mobile Broadband (1st edition). Wiley, 2011. [3] Bertoni G, Daemen J, Peeters M, van Assche G. Keccak. In Proc. the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2013, pp.313-314. [4] Steele R, Lee C C, Gould P. GSM, cdmaOne and 3G Systems (1st edition). Wiley, 2001. [5] Mangard S, Oswald E, Popp T. Power Analysis Attacks:Revealing the Secrets of Smart Cards. Springer, 2007. [6] Rao J R, Rohatgi P, Scherzer H, Tinguely S. Partitioning attacks:Or how to rapidly clone some GSM cards. In Proc. the 2002 IEEE Symposium on Security and Privacy, May 2002, pp.31-41. [7] Zhou Y, Yu Y, Standaert F X, Quisquater J J. On the need of physical security for small embedded devices:A case study with COMP128-1 implementations in SIM cards. In Proc. the 17th International Conference on Financial Cryptography and Data Security, April 2013, pp.230-238. [8] Liu J, Yu Y, Standaert F X, Guo Z, Gu D, Sun W, Ge Y, Xie X. Small tweaks do not help:Differential power analysis of MILENAGE implementations in 3G/4G USIM cards. In Proc. the 20th European Symposium on Research in Computer Security, September 2015, pp.468-480. [9] Maghrebi H, Bringer J. Side-channel analysis of the TUAK algorithm used for authentication and key agreement in 3G/4G networks. In Proc. the 15th International Conference on Smart Card Research and Advanced Applications, November 2016, pp.39-56. [10] Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In Proc. the 6th International Workshop on Cryptographic Hardware and Embedded Systems, August 2004, pp.16-29. [11] Kocher P, Jaffe J, Jun B. Differential power analysis. In Proc. the 19th Annual International Cryptology Conference, August 1999, pp.388-397. |
No related articles found! |
|
版权所有 © 《计算机科学技术学报》编辑部 本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn 总访问量: |