研究密码MIBS安全性评估问题。基于单比特泄露模型,假定攻击者可以获取加密中间状态的1比特信息泄露。预处理阶段,随机生成不同选择明文和密钥进行极大项和超多项式提取;在线分析阶段,利用超多项式和加密输出中间状态信息泄露构建关于密钥变量的低次方程组,经方程组求锯恢复密钥。结果表明:针对MIBS加密第1轮输出的第5比特泄露,2^6.39个选择明文分析将MIBS-64密钥搜索空间降低至2^40。经暴力破解可最终恢复64位MIBS完整密钥。改进方法对其它分组密码旁路立方体攻击研究具有一定借鉴意义。
We investigated the security of MIBS block cipher which was proposed. Based on single bit leakage model, the attacker was assumed to have access to one bit of information about the internal state of cipher. During the processing phrase, plaintexts and keys were chosen randomly to derive the maxterm and superploy. In the online phrase, the superpoly and internal state bit leakages were exploited to construct equations about key variable. Lastly, the key was recovered by solving equations. Experiment results show that as to the fifth output bit of the first round of MIBS, 26.39 chosen plaintexts are needed to reduce the key search space from 264 to 240. The whole 64 bits master key can be recovered by brute force. The method can also be applied to other lightweight block cipher.