| 注册
首页|期刊导航|信息安全研究|IKE协议的侧信道攻击方法研究

IKE协议的侧信道攻击方法研究

李军 孙云霄 王佰玲

信息安全研究2025,Vol.11Issue(10):933-940,8.
信息安全研究2025,Vol.11Issue(10):933-940,8.DOI:10.12379/j.issn.2096-1057.2025.10.08

IKE协议的侧信道攻击方法研究

Research on Side-channel Attack Methods of IKE Protocol

李军 1孙云霄 1王佰玲2

作者信息

  • 1. 哈尔滨工业大学(威海)计算机科学与技术学院 山东威海 264209
  • 2. 哈尔滨工业大学(威海)计算机科学与技术学院 山东威海 264209||哈尔滨工业大学网络空间安全研究院 哈尔滨 150001
  • 折叠

摘要

Abstract

Analyze the implementation of the IKE protocol,construct an IKE protocol message generation model,and verify three side-channel attack methods against the IKE protocol under security assumptions and Dolev-Yao threat models.Attackers can obtain users' privacy information,and increase the number of target user tags they possess,based on which targeted attack methods and tools can be selected.For the three potential security risks that may cause privacy breaches,the information entropy algorithm is introduced for quantitative evaluation.By calculating the changes in information entropy,the impact of different privacy information breaches on user security is quantitatively analyzed,which is beneficial for users to take targeted security protection measures.The experimental results verified the effectiveness of three side-channel attack methods,and also proved that the information entropy quantification evaluation method can clearly characterize the degree of harm caused by privacy leakage,providing a basis for users to formulate security protection measures and helping to reduce potential privacy leakage risks.

关键词

互联网密钥交换协议/侧信道/隐私泄露/信息熵/量化评估

Key words

IKE protocol/side-channel/privacy disclosure/information entropy/quantitative evaluation

分类

信息技术与安全科学

引用本文复制引用

李军,孙云霄,王佰玲..IKE协议的侧信道攻击方法研究[J].信息安全研究,2025,11(10):933-940,8.

基金项目

国家重点研发计划项目(2021YFB2012400) (2021YFB2012400)

国家自然科学基金项目(62272129) (62272129)

山东省重点研发计划项目(2023CXPT065) (2023CXPT065)

信息安全研究

OA北大核心

2096-1057

访问量0
|
下载量0
段落导航相关论文