检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:马艺新 唐时博 谭静 李雪霏 胡伟[1] MA Yixin;TANG Shibo;TAN Jing;LI Xuefei;HU Wei(School of Cyberspace Security, Northwestern Polytechnical University, Xi′an 710072, China)
机构地区:[1]西北工业大学网络空间安全学院,陕西西安710072
出 处:《西北工业大学学报》2022年第1期76-83,共8页Journal of Northwestern Polytechnical University
基 金:国家自然科学基金(62074131);陕西省自然科学基金(2021JQ-123)资助。
摘 要:密码算法核是保障信息机密性和完整性的关键部件。由于密码算法实现的安全性与算法在数学上的安全性是2个完全不同的问题,密码算法核可能隐含设计缺陷和旁路信道等安全隐患。基于功能验证的安全性分析方法严重依赖于测试向量的质量,覆盖率低,难以满足密码算法核这一安全关键部件的安全验证需求。从信息流安全的角度研究密码算法核安全验证与漏洞检测方法。该方法能够对密码算法核中全部逻辑信息流进行精确度量,实现对机密性和完整性等安全属性的形式化验证,可通过捕捉有害信息流动来检测密码算法核设计中潜在的安全隐患。实验结果表明信息流安全验证方法对密码算法核中的设计缺陷和旁路信道导致的敏感信息泄漏有很好的检测效果。Cryptographic cores are the key components to enforce information security properties related to confidentiality and integrity. Since the security of a cryptographic core implementation and the security of the cryptographic algorithm itself from the mathematical perspective are two different problems, cryptographic cores may contain hidden security vulnerabilities such as design flaws and side channels. Security analysis methods based on functional verification rely heavily on the quality of test vectors and usually have low test coverage, which is difficult to meet the security verification requirements of security-critical components like cryptographic cores. This work proposes a cryptographic core security verification and vulnerability detection method from the perspective of information flow security. The proposed method can accurately measure all logical information flows in cryptographic core designs to formally verify security properties such as confidentiality and integrity. It can detect potential security vulnerabilities in cryptographic implementations by capturing harmful information flows. Experimental results show that our information flow security verification method is effective in detecting sensitive information leakage caused by the design vulnerabilities and side channels in cryptographic cores.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.138.112.77