Using input-output correlations and a modified slide attack to compromise IEC 62055-41

Reagan Mbitiru, T. Ustun
{"title":"Using input-output correlations and a modified slide attack to compromise IEC 62055-41","authors":"Reagan Mbitiru, T. Ustun","doi":"10.1109/ROPEC.2017.8261692","DOIUrl":null,"url":null,"abstract":"Developed initially for pre-paid electricity meters in South Africa, the IEC 662055-41 standard is now the world's most ubiquitous open pre-paid metering standard. The standard is used in 35 million meters operated in 400 utilities in 30 countries. It now serves more users in Asia than in Africa. The standard uses 16 cycles of a block-cipher-like substitution and permutation process to both generate 20 digit tokens (through an encryption process) and to decode 20 digit tokens and determine the number of kWhs procured (through a decryption process), in conjunction with a 64 bit decoder key generated using the Data Encryption standard (DES). Despite its popularity, there is little work on the cryptology aspects of this standard. This paper discusses two types of cryptanalysis techniques used to attack this pre-paid metering standard. The first is a statistical analysis of the encrypted and decrypted inputs and outputs to determine if any correlation between them exists. The second is the use of slide attacks, a technique traditionally used for attacking block ciphers that use the same or ‘weak’ round keys for each encryption/decryption cycle. Using this second cryptanalysis attack, it is shown that 16 of the 64 bits of the decoder key can be exposed, an aspect not intended by its designers. Further combination with other techniques may be used to compromise the entire key.","PeriodicalId":260469,"journal":{"name":"2017 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ROPEC.2017.8261692","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Developed initially for pre-paid electricity meters in South Africa, the IEC 662055-41 standard is now the world's most ubiquitous open pre-paid metering standard. The standard is used in 35 million meters operated in 400 utilities in 30 countries. It now serves more users in Asia than in Africa. The standard uses 16 cycles of a block-cipher-like substitution and permutation process to both generate 20 digit tokens (through an encryption process) and to decode 20 digit tokens and determine the number of kWhs procured (through a decryption process), in conjunction with a 64 bit decoder key generated using the Data Encryption standard (DES). Despite its popularity, there is little work on the cryptology aspects of this standard. This paper discusses two types of cryptanalysis techniques used to attack this pre-paid metering standard. The first is a statistical analysis of the encrypted and decrypted inputs and outputs to determine if any correlation between them exists. The second is the use of slide attacks, a technique traditionally used for attacking block ciphers that use the same or ‘weak’ round keys for each encryption/decryption cycle. Using this second cryptanalysis attack, it is shown that 16 of the 64 bits of the decoder key can be exposed, an aspect not intended by its designers. Further combination with other techniques may be used to compromise the entire key.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用输入输出相关性和修改的滑动攻击来破坏IEC 62055-41
IEC 662055-41标准最初是为南非的预付费电表开发的,现在是世界上最普遍的开放式预付费计量标准。该标准在30个国家的400个公用事业公司的3500万个电表中使用。现在,它在亚洲的用户数量已经超过了非洲。该标准使用类似块密码的替换和置换过程的16个周期来生成20位数字令牌(通过加密过程)和解码20位令牌并确定获得的kwh数(通过解密过程),并使用使用数据加密标准(DES)生成的64位解码器密钥。尽管它很受欢迎,但关于该标准的密码学方面的工作很少。本文讨论了用于攻击这种预付费计量标准的两种密码分析技术。首先是对加密和解密的输入和输出进行统计分析,以确定它们之间是否存在任何相关性。第二种是使用滑动攻击,这是一种传统上用于攻击块密码的技术,这些块密码对每个加密/解密周期使用相同或“弱”轮密钥。使用第二次密码分析攻击,可以显示解码密钥的64位中的16位可以暴露,这是其设计者没有打算的方面。与其他技术的进一步组合可以用来破坏整个密钥。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The teaching-learning of Graph Theory with the support of Learn Graph-Ware software Efficiency based comparative analysis of selected classical MPPT methods YOCASTA: A ludic-interactive system to support the detection of anxiety and lack of concentration in children with disabilities Design and analysis of performance of a forward converter with winding tertiary Sags and swells compensation and power factor correction using a dynamic voltage restorer in distribution systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1