{"id":86940,"updated":"2025-01-21T17:29:38.640565+00:00","links":{},"created":"2025-01-18T23:37:50.654479+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00086940","sets":["1164:2036:6668:6917"]},"path":["6917"],"owner":"11","recid":"86940","title":["Camellia暗号回路に対するスキャンベース攻撃手法"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-11-19"},"_buckets":{"deposit":"41911f51-8f92-40ce-b5c5-d20488934f74"},"_deposit":{"id":"86940","pid":{"type":"depid","value":"86940","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Camellia暗号回路に対するスキャンベース攻撃手法","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Camellia暗号回路に対するスキャンベース攻撃手法"},{"subitem_title":"Scan-based Attack against Camellia Cryptosystems","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュア設計","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2012-11-19","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"早稲田大学大学院基幹理工学研究科"},{"subitem_text_value":"早稲田大学大学院基幹理工学研究科"},{"subitem_text_value":"早稲田大学大学院基幹理工学研究科"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Grad. of Fundamental Science and Engineering, Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Grad. of Fundamental Science and Engineering, Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Grad. of Fundamental Science and Engineering, Waseda University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/86940/files/IPSJ-SLDM12158010.pdf"},"date":[{"dateType":"Available","dateValue":"2100-01-01"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SLDM12158010.pdf","filesize":[{"value":"562.2 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"10"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"77b68d6a-9de5-4029-bfde-ca0f67588f5a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2012 by the Institute of Electronics, Information and Communication Engineers\nThis SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"小寺, 博和"},{"creatorName":"柳澤, 政生"},{"creatorName":"戸川, 望"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hirokazu, Kodera","creatorNameLang":"en"},{"creatorName":"Masao, Yanagisawa","creatorNameLang":"en"},{"creatorName":"Nozomu, Togawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11451459","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Camellia は共通鍵ブロック暗号であり, AES よりも高い暗号攻撃耐性と持ち, AES と同等の処理性能を持つ暗号アルゴリズムである暗号化と復号の処理が共用でき,算術演算を使用しないことから,少ないゲート数でハードウェア実装可能であるため,実用性にも優れている Camellia はラウンド関数を 18 回繰り返す, 18 段 Feistel 構造である一方で,スキャンパステストで用いるスキャンチェインから取得可能なスキャンデータをもとに秘密鍵を特定するスキャンベース攻撃が報告されている.しかし, Camellia に対するスキャンベース攻撃手法は報告されていない本稿では, Camellia に対するスキャンベース攻撃手法を提案する提案手法では, 2 つの特定の平文を Camellia 暗号 LSI に入力したときの 2 つのスキャンデータを取得し,それらを XOR することでラウンド関数の S 関数の影響を除去する.また, XOR したスキャンデータの特定のビット列に着目し,対応するレジスタの変化を観察することで第 4 ラウンドまでの 4 つの等価鍵を特定し,第 3 ラウンドと第 4 ラウンドの等価鍵を用いて秘密鍵を解読する提案手法を用いて Camellia の秘密鍵を解読できることをソフトウェア実装実験によって示した.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Camellia is a common key cryptosystem and it has higher tolerance for cryptoanalysis than AES. In addition, Camellia has a processing speed which is equivalent to AES. Because Camellia can share encryption processing with decryption processing and it doesn’t use arithmetic operation, it can be implemented hardware with the small number of gates. Recently, scan-based attacks are reported which retrieve secret keys with scanned data obtained from scan chain. There are no reports on scan-based attack against Camellia. In this paper, we propose a scan-based attack method against Camellia. Camellia has an 18-round Feistel structure which repeats the round function 18 times. In our proposed method, attackers input two plaintexts to a Camellia cryptosystem LSI and obtain two scanned data. By XORing them, influence of S-funtion in the round function can be removed. We focus on specific bit column data of XORed scanned data and, by observing transition of correspoding registers. Then, attackers retrieve four equivalent keys and restore a secret key in Camellia. We showed that secret keys of Camellia are restored with our proposed method.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告システムLSI設計技術(SLDM)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2012-11-19","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"10","bibliographicVolumeNumber":"2012-SLDM-158"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}