期刊文献+

AES差分故障攻击的建模与分析 被引量:4

Modeling and Analysis of AES Differential Fault Attack
下载PDF
导出
摘要 研究高级加密标准(AES)密码算法对差分故障攻击的安全性。攻击采用针对密钥扩展算法的单字节随机故障模型,通过对比正确和错误密文的差异恢复种子密钥。该攻击方法理论上仅需104个错误密文和2个末轮子密钥字节的穷举搜索就可完全恢复AES的128比特种子密钥。故障位置的不均匀分布使实际攻击所需错误密文数与理论值略有不同。 This paper examines the ability of Advanced Encryption Standard(AES) against the differential fault attack. It uses the byte-oriented fault model against AES key schedule, and compares the differences between correct and faulty secret information embedded in a system to retrieve seed key. Theoretically, the 128 bit master key for AES can be obtained by using 104 faulty eiphertexts and retrieving 2 bytes of tenth round keys by exhaustive search. For the fact that the byte position where the fault happens is not equally distributed, there is little differences between the theoretical value and the number of faulty ciphertexts needed in the attack experiment result.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第1期189-190,200,共3页 Computer Engineering
基金 湖南省教育厅科研基金资助项目(08C335)
关键词 高级加密标准 差分故障攻击 故障诱导 故障模型 Advanced Encryption Standard(AES) differential fault attack fault inducing fault model
  • 相关文献

参考文献5

  • 1Daemen J, Rijmen V. AES Proposal: Rijndael(Version 2)[Z]. (2008-09-11). http://csrc.nist.gov/encryption/aes.
  • 2Giraud C. DFA on AES[M]. Berlin, Germany: Springer-Verlag, 2005.
  • 3Dusart P, Letoumeux G, Vivolo O. Differential Fault Analysis on AES[M]. Berlin, Heidelberg, Germany: Springer-Verlag, 2003.
  • 4Chen Chien-Ning, Yen Sung-Ming. Differential Fault Analysis on AES Key Schedule and Some Countermeasures[M]. Berlin, Heidelberg, Germany: Springer-Verlag, 2003.
  • 5张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67

二级参考文献11

  • 1国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法.http://www. oscca. gov. cn/UpFile/200621016423197990.pdf.
  • 2Boneh D. , DeMillo R. A. , Lipton R. J.. On the importance of checking cryptographic protocols for faults. In: Proceedings of the EUROCRYPT'97, Konstanz, Germany, 1997, 37-51
  • 3Biham E. , Shamir A.. Differential fault analysis of secret key cryptosystems. In: Proceedings of the CRYPTO' 97, Santa Barbara, California, USA, 1997, 513-525
  • 4Biehl I. , Meyer B. , Muller V.. Differential fault attacks on elliptic curve cryptosystems. In: Proceedings of the CRYPTO 2000, Santa Barbara, California, USA, 2000, 131- 146
  • 5Blomer J. , Seifert Jean Pierre. Fault based cryptanalysis of the advanced encryption standard (AES). In: Wright R. N. ed.Financial Cryptography-FC 2003. Lecture Notes in Computer Science 2742. Berlin: Springer-Verlag, 2003, 162- 181
  • 6Giraud C.. DFA on AES. In: Dobbertin H. , Rljmen V.Sowa A. eds. Advanced Eneryption Standard 4-AES 2004. Lecture Notes in Computer Science 3373. Berlin: Springer Verlag, 2005, 27-41
  • 7Chen Chien-Ning, Yen Sung-Ming. Differential fault analysis on AES key schedule and some countermeasures. In: Proceedings of the Australasian Conference on Information Security and Privacy-ACISP 2003, Wollongong, Australia, 2003, 118- 129
  • 8Dusart P. , Letourneux G. , Vivolo O.. Differential fault analysis on AES. In: Zhou J., Yung M. , Han Y.. eds.. Applied Cryptography and Network Security-ACNS 2003. Lecture Notes in Computer Science 2846. Berlin: Springer-Verlag,
  • 9Heroine L.. A differential fault attack against early rounds of(Triple-) DES. In: Joye Marc, Quisquater Jean-Jacques eds.Cryptographic Hardware and Embedded Systems CHES 2004.Lecture Notes in Computer Science 3156. Berlin: Springer-Verlag, 2004, 254-267
  • 10Hoch Jonathan J. , Shamir A: Fault analysis of stream ciphers. In:Joye Marc, Quisquater Jean Jacques eds. Cryptographic Hardware and Embedded Systems-CHES 2004. Lecture Notes in Computer Science 3156. Berlin: Springer-Vetlag, 2004, 240-253

共引文献66

同被引文献22

  • 1Boneh D,DeMillo R,Lipton R.On the Importance of Checking Cryptographic Protocols for Faults[C]//proc.of CryptologyEurocrypt'97.Konstanz,Germany:[s.n.],1997.
  • 2Biham E,Shamir A.Differential Fault Analysis of Secret Key Cryptosystems[C]//Proc.of Crypto'97.Santa Barbara,California,USA:[s.n.],1997.
  • 3Piret G,Quisquater J J.A Differential Fault Attack Technique Against SPN Structures,with Application to the AES and KHAZAD[C]//Proc.of CHES'03.Cologne,Germany:[s.n.],2003.
  • 4Aumuller C,Bier P,Fischer W,et al.Fault Attacks on RSA with CRT:Concrete Results and Practical Countermeasures[C]//Proc.of CHES'02.Redwood Shores,USA:[s.n.].2002.
  • 5Joye M J,Lenstra A K.Chenses Remaindering Cryptosystems in the Presence of Faults[J].Journal of Cryptology,1999,12(4):241-245.
  • 6Rivain M,Dottax E,Prouff E.Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis[C]//Proc.of FSE'08.Lausanne,Switzerland:[s.n.].2008.
  • 7陈浩,谢永春,安红章.星座系统安全防护技术研究[C]//保密通信与信息安全现状研讨会论文集.出版地不详:出版者不详,2007:124-129.
  • 8Li Wei,Gu Dawu,Li Juanru.Differential Fault Analysis on the ARIA Algorithm[J].Information Sciences,2008,178(19): 3727- 3737.
  • 9Kim Chang-Kyun,Schl?ffer M,Moon Sang-Jae.Differential Side Channel Analysis Attacks on FPGA Implementations of ARIA[J].ETRI Journal,2008,30(2): 315-325.
  • 10Carlier V,Chabanne H,Dottax E,et al.Electromagnetic Side Channels of an FPGA Implementation of AES[EB/OL].(2004-06- 19).http://eprint.iacr.org/2004/145.pdf.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部