Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (10): 933-.

Previous Articles     Next Articles

Research on Sidechannel Attack Methods of IKE Protocol

Li Jun1, Sun Yunxiao2, and Wang Bailing1,2
  

  1. 1(School of Computer Science and Technology, Harbin Institute of Technology(Weihai), Weihai, Shandong 264209)
    2(Research Institute of Cyberspace Security, Harbin Institute of Technology, Harbin 150001)
    

  • Online:2025-10-15 Published:2025-10-17

IKE协议的侧信道攻击方法研究

李军1孙云霄1王佰玲1,2
  

  1. 1(哈尔滨工业大学(威海)计算机科学与技术学院山东威海264209)
    2(哈尔滨工业大学网络空间安全研究院哈尔滨150001)
  • 通讯作者: 王佰玲 博士,教授,博士生导师.主要研究方向为工业互联网安全、信息安全、金融安全. wbl@hit.edu.cn
  • 作者简介:李军 硕士.主要研究方向为网络安全协议分析. icelee1218@163.com 孙云霄 博士.主要研究方向为网络安全协议分析. syx@hitwh.edu.cn 王佰玲 博士,教授,博士生导师.主要研究方向为工业互联网安全、信息安全、金融安全. wbl@hit.edu.cn

Abstract: Analyze the implementation of the IKE protocol, construct an IKE protocol message generation model, and verify three sidechannel attack methods against the IKE protocol under security assumptions and DolevYao threat models. Attackers can obtain users’ privacy information, and increase the number of target user tags they possess, based on which targeted attack methods and tools can be selected. For the three potential security risks that may cause privacy breaches, the information entropy algorithm is introduced for quantitative evaluation. By calculating the changes in information entropy, the impact of different privacy information breaches on user security is quantitatively analyzed, which is beneficial for users to take targeted security protection measures. The experimental results verified the effectiveness of three sidechannel attack methods, and also proved that the information entropy quantification evaluation method can clearly characterize the degree of harm caused by privacy leakage, providing a basis for users to formulate security protection measures and helping to reduce potential privacy leakage risks.

Key words: IKE protocol, sidechannel, privacy disclosure, information entropy, quantitative evaluation

摘要: 分析互联网密钥交换(Internet key exchange, IKE)协议的实现,构建IKE协议报文生成模型,在安全假设和DolevYao威胁模型的条件下验证3种针对IKE协议的侧信道攻击方法,攻击者可以获取用户的隐私信息,增加所掌握目标用户标签的数量,据此可以选取针对性的攻击方法和攻击工具.对于3种可能造成隐私泄露的安全隐患,引入信息熵算法进行量化评估,通过计算信息熵的变化,定量分析了不同隐私信息泄露对用户安全性的影响,有利于用户采取针对性的防护措施.实验结果验证了3种侧信道攻击方法的有效性,同时也证明通过信息熵量化评估方法可以清晰刻画隐私泄露的危害程度,为用户制定安全防护措施提供了依据,有助于减少潜在的隐私泄露风险.

关键词: 互联网密钥交换协议, 侧信道, 隐私泄露, 信息熵, 量化评估

CLC Number: