TY - JOUR
T1 - Cryptanalysis of chaos-based cryptosystem from the hardware perspective
AU - Luo, Yuling
AU - Zhang, Dezheng
AU - Liu, Junxiu
AU - Liu, Yunqi
AU - Cao, Yi
AU - Ding, Xuemei
PY - 2018/8/1
Y1 - 2018/8/1
N2 - Chaos has been used in cryptography for years and many chaotic cryptographic systems have been proposed. Their securities are often evaluated by conducting conventional statistical tests, however few studies have referred to the security issue of the chaotic hardware cryptographic systems. This paper evaluates the security of the chaotic cryptographic system from a hardware perspective by using the side channel analysis attack. First, a chaotic block cryptosystem is designed and implemented based on an Atmel microcontroller. Then the conventional statistical security tests, including SP 800-22 test, characters frequency test, avalanche test, are used to verify its security performance. In the meantime, the correlation power analysis attack is carried out for the security evaluation. Experimental results demonstrate that even though the chaotic cryptographic system can pass the conventional statistical tests, it still has the probability to be attacked from a hardware perspective using the leaked side channel information such as execution time and power consumption. This paper proposes another way to analyze the security of the chaotic cryptosystem, which can aid designing mechanisms to enhance the security of the hardware cryptosystems in the future.
AB - Chaos has been used in cryptography for years and many chaotic cryptographic systems have been proposed. Their securities are often evaluated by conducting conventional statistical tests, however few studies have referred to the security issue of the chaotic hardware cryptographic systems. This paper evaluates the security of the chaotic cryptographic system from a hardware perspective by using the side channel analysis attack. First, a chaotic block cryptosystem is designed and implemented based on an Atmel microcontroller. Then the conventional statistical security tests, including SP 800-22 test, characters frequency test, avalanche test, are used to verify its security performance. In the meantime, the correlation power analysis attack is carried out for the security evaluation. Experimental results demonstrate that even though the chaotic cryptographic system can pass the conventional statistical tests, it still has the probability to be attacked from a hardware perspective using the leaked side channel information such as execution time and power consumption. This paper proposes another way to analyze the security of the chaotic cryptosystem, which can aid designing mechanisms to enhance the security of the hardware cryptosystems in the future.
KW - chaotic block cipher
KW - correlation power analysis
KW - round keys
KW - side channel analysis
UR - http://www.scopus.com/inward/record.url?scp=85052856682&partnerID=8YFLogxK
U2 - 10.1142/S0218127418501146
DO - 10.1142/S0218127418501146
M3 - Article
AN - SCOPUS:85052856682
SN - 0218-1274
VL - 28
JO - International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
JF - International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
IS - 9
M1 - 1850114
ER -