期刊文献+

SHACAL-2算法的差分故障攻击 被引量:9

Differential Fault Analysis on SHACAL-2
下载PDF
导出
摘要 该文采用面向字的随机故障模型,结合差分分析技术,评估了SHACAL-2算法对差分故障攻击的安全性。结果显示:SHACAL-2算法对差分故障攻击是不免疫的。恢复出32 bit子密钥的平均复杂度为8个错误密文,完全恢复出512 bit密钥的复杂度为128个错误密文。 By using word-oriented fault model and the technique of differential cryptanalysis, the security of SHACAL-2 against differential fault analysis is evaluated. Result shows that SHACAL-2 is not immune to such kind of attack. 8 faulty ciphertexts can recover a sub key of 32 bit on average and 128 faulty ciphertexts are needed to recover all the 512 bit keys.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第2期318-322,共5页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60803156) 信息安全国家重点实验室开放基金(01-07)资助课题
关键词 分组密码 SHACAL-2 差分故障攻击 Block cipher SHACAL-2 Differential fault analysis
  • 相关文献

参考文献11

  • 1Boneh D, DeMillo R A, and Lipton R J. On the importance of checking cryptographic protocols for faults.EUROCRYPT'97, Konstanz, Germany, 1997, LNCS 1233: 37-51.
  • 2Biham E and Shamir A. Differential fault analysis of secret key cryptosystems. CRYPTO'97, California, USA, 1997, LNCS 1294: 513-525.
  • 3Biehl I, Meyer B, and Milller V. Differential fault attacks on elliptic curve cryptosystems. CRYPTO 2000, California, USA, 2000, LNCS 1880: 131-146.
  • 4Hemme L. A differential fault attack against early rounds of (Triple-) DES. Cryptographic Hardware and Embedded Systems-CHES 2004. Boston, 2004, LNCS 3156: 254-267.
  • 5张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 6Li Wei, Gu Da-wu, and Li Juan-ru. Differential fault analysis on the ARIA algorithm. Information Sciences, 2008, 178(19): 3727-3737.
  • 7李玮,谷大武.基于密钥编排故障的SMS4算法的差分故障分析[J].通信学报,2008,29(10):135-142. 被引量:23
  • 8Chen Hua, Wu Wen-ling, and Feng Deng-guo. Differential fault analysis on CLEFIA. International Conference on Information and Communication Security-ICICS 2007, Zhengzhou, China, 2007, LNCS 4861: 284-295.
  • 9Piret G and Quisquater J J. A differential fault attack technique against SPN Structures, with Application to the AES and KHAZAD. Cryptographic Hardware and Embedded Systems-CHES 2003.Cologne, 2003, LNCS 2779: 77-88.
  • 10李琳,李瑞林,谢端强,李超.KeeLoq和SHACAL-1算法的差分故障攻击[J].武汉大学学报(理学版),2008,54(5):507-512. 被引量:10

二级参考文献54

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2KELSEY J, SCHNE/ER B, WANGNER D, et al. Side channel crypt-analysis of product ciphers[A]. The European Symposium on Research in Computer Security-ESORICS '98[C]. Louvain-la-Neuve, Belgium, 1998.97-110.
  • 3BONEH D, DEMILLO R A, LIPTON R J. On the importance of checking cryptographic protocols for faults[A]. EUROCRYPT'97[C]. Konstanz, Germany, 1999.37-51.
  • 4KOCHER C P. Timing analysis on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. CRYPTO'96[C]. Santa Barbara, California, 1996. 204-223.
  • 5KOCHER C P, JAFFE J, JUN B. Differential power analysis[A]. CRYPTO'99[C]. 1999.388-397.
  • 6BIHAM E, SHAMIR A. Differential fault analysis of secret key cryptosystems[A]. CRYPTO'97[C]. Santa Barbara, California, USA, 1997. 523-525.
  • 7BIEHL I, MEYER B, MULLER V. Differential fault analysis on elliptic curve cryptosystems[A]. CRYPTO 2000[C]. Santa Barbara, California, 2000. 232-246.
  • 8BLOMER J, SEIFERT J E Fault based cryptanalysis of the advanced encryption standard (AES)[A]. Financial Cryptography-FC 2003[C]. Guadeloupe, French West Indies, 2003. 162-181.
  • 9GIRAOUD C. DFA on AES[A]. Advanced Encryption Standard-AES[C]. Berlin, 2005.27-41.
  • 10CHEN C N, YEN S M. Differential fault analysis on AES key schedule and some countermeasures[A]. Proceedings of the Australasian Conference on Information Security and Privacy-ACISP 2003[C]. Wollongong, Australia, 2003. 118-129.

共引文献78

同被引文献70

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2陈杰,胡予濮,张跃宇.不可能差分分析高级加密标准[J].中国科学(E辑),2007,37(2):191-198. 被引量:4
  • 3Biryukov A. The design of a stream cipher LEX [C] //Biham E, Youssef A M. Selected Areas in Cryptog- raphy. Berlin Heidelberg: Springer Verlag, 2007 : 67- 75.
  • 4Wu H, Preneel B. Resynchronization attacks on WG and LEX [J]. Lecture Notes in Computer Science, 2006,4047 : 422-432.
  • 5Boneh D, DeMillo R A, Lipton R J. On the impor- tance of checking cryptographic protocols for faults [J]. Lecture Notes in Computer Science, 1997, 1233. 37-51.
  • 6Biham E, Shamir A. Differential fault analysis of se- cret key cryptosystems [J]. Lecture Notes in Comput- er Science, 1994,1294. 513 525.
  • 7Giraud C. DFA on AES [J]. Lecture Notes in Com- puter Science, 2005, 3373. 27-41.
  • 8Hemme L. A differential fault attack against early rounds of (Triple) DES [J]. Lecture Notes in Com- puter Science, 2004,3156 . 254-267.
  • 9Hojsik M, Rudolf B. Differential fault analysis of Trvium[C]// Fast Software Encryption. Berlin:Springer Verlag, 2008: 158-172.
  • 10Skorobogatov S, Anderson R. Optical fault induction attacks [J]. Lecture Notes in Computer Science,2003, 2523: 2-12.

引证文献9

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部