信息安全研究2025,Vol.11Issue(10):933-940,8.DOI:10.12379/j.issn.2096-1057.2025.10.08
IKE协议的侧信道攻击方法研究
Research on Side-channel Attack Methods of IKE Protocol
摘要
Abstract
Analyze the implementation of the IKE protocol,construct an IKE protocol message generation model,and verify three side-channel attack methods against the IKE protocol under security assumptions and Dolev-Yao threat models.Attackers can obtain users' privacy information,and increase the number of target user tags they possess,based on which targeted attack methods and tools can be selected.For the three potential security risks that may cause privacy breaches,the information entropy algorithm is introduced for quantitative evaluation.By calculating the changes in information entropy,the impact of different privacy information breaches on user security is quantitatively analyzed,which is beneficial for users to take targeted security protection measures.The experimental results verified the effectiveness of three side-channel attack methods,and also proved that the information entropy quantification evaluation method can clearly characterize the degree of harm caused by privacy leakage,providing a basis for users to formulate security protection measures and helping to reduce potential privacy leakage risks.关键词
互联网密钥交换协议/侧信道/隐私泄露/信息熵/量化评估Key words
IKE protocol/side-channel/privacy disclosure/information entropy/quantitative evaluation分类
信息技术与安全科学引用本文复制引用
李军,孙云霄,王佰玲..IKE协议的侧信道攻击方法研究[J].信息安全研究,2025,11(10):933-940,8.基金项目
国家重点研发计划项目(2021YFB2012400) (2021YFB2012400)
国家自然科学基金项目(62272129) (62272129)
山东省重点研发计划项目(2023CXPT065) (2023CXPT065)