期刊文献+

FOX算法的差分故障攻击 被引量:1

Differential Fault Analysis of FOX Algorithm
原文传递
导出
摘要 FOX算法是用于欧洲有线电视的分组密码算法,该算法整体采用Lai-Massey结构,其中的圈函数使用SPS结构。FOX算法的设计结构比较典型,实际应用的范围很广,目前对于该算法的分析却并不多见。研究了FOX算法对于差分故障攻击的安全性。提出一种采用面向字节的随机故障模型,并结合差分分析技术的攻击方法。结果显示,差分故障攻击对于FOX算法是有效的;实验结果也验证了这一事实。该攻击方法恢复出全部密钥信息平均需要128个错误密文,计算穷举量为O(215)。 FOX algorithm is the block cipher applied to the European Cable TV, which is based on a Lai-Massey scheme with the round function of SPS structure. FOX has a typical designed structure and is widely used in practice. However, there is seldom published paper on its security. In this paper, the strength of FOX against the differential fault analysis is examined, and with reference to the attack by differential fault analysis, a byte-oriented fault model is proposed. The experiment result shows that FOX is vulnerable to differential fault analysis. The result of attack experiment verifies this fact too. 128 faulty ciphertexts on average is required to recover the whole keys information, with an exhaustive calculation amount of O(2^15 ).
出处 《通信技术》 2010年第8期175-177,180,共4页 Communications Technology
关键词 分组密码 FOX算法 旁路攻击 差分故障攻击 故障模型 block cipher FOX side-channel attack differential fault analysis fault model
  • 相关文献

参考文献11

  • 1JUNOD P, VAUDENAY S. FOX: a New Family of Block Ciphers[C]// Selected Areas in Cryptography-SAC 2004. LNCS 3357. Waterloo: Springer-Verlag, 2007:131-146.
  • 2BONEH D, DEMILLO R A, AND LIPTON R J. On the Importance of Checking Cryptographic Protocols for Faults[C]//EUROCRYPT' 97, LNCS 1233. Konstanz: Springer-Verlag, 1997:37-Sl.
  • 3BIHAM E, SHAMIR A. Differentail Fault Analysis of Secret Key Cryptosystems[C]//CRYPTO' 97, LNCS 1294. California: Springer-Verlag, 1997:513-525.
  • 4BIEHL I, MEYER B, MULLER V. Differential Fault Attacks on Elliptic Carve Cryptosystems[C]//CRYPTO 2000. LNCS 1880. California: Springer-Verlag, 2000:131-146.
  • 5HEMME L. A Differential Fault Attack Against Early Rounds of (Triple-) DES[C]//Cryptographic Hardware and Embedded Systems-CHES 2004. LNCS 3156. Boston: Springer-Verlag, 2004: 254-267.
  • 6BIHAM E, GRANBOULAN L, NGUYEN P Q. Impossible Fault Analysis of RC4 and Differentail Fault Analysis of RC4[C]//In Fast Software Encryption-FSE 2005. Lecture Notes in Computer Science 3357. Berlin: Springer-Verlag, 2005:359-367.
  • 7GIRAUD C. DFA on AES[C]//In Advanced Encryption Standard 4-AES 2004. Lecture Notes in Computer Science 3373. Berlin: Springer- Verlag, 2005:27-41.
  • 8张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 9LI W, GU DW, LI J R. Differential Fault Analysis on the ARIA Algorithm[J].Information Science, 2008,1?8(19):3727-3737.
  • 10CHEN H, WU W L, FENG D G. Differential Fault Analysis on CLEFIA[C]//9th International Conference, ICICS 2007. LNCS 4861. Berlin: Springer-Verlag, 2007:284-295.

二级参考文献21

  • 1罗岚,魏正耀,蒋绍权.分组密码算法圈函数设计及可证安全性[J].通信技术,2007(6):44-45. 被引量:1
  • 2Boneh D, DeMillo RA, Lipton RJ. On the Importance of Checking Cryptographic Protocols for Faults[C]//Walter Fumy. Lecture Notes in Computer Science. Berlin:Springer verlag, 1997:37-51.
  • 3BihamE, Shamir A. Differential Fault Analysis of Secret Key Cryptosystems[C]//Burton S, Kaliski Jr. Lecture Notes in Computer Science, Berlin: Springer Verlag, 1997: 513-525.
  • 4Blomer J, Seifert J. Fault Based Cryptanalysis of the Advanced Encryption Standard[C]//Rebecca N. Wright. Lecture Notes in Computer Science. Berlin: Springer-verlag, 2003:162-181.
  • 5Skorobogatov S, Anderson R. Optical Fault Induction Attack[C]// Burton S, Kaliski Jr. Lecture Notes in Computer Science. Berlin: Springer verlag, 2003:2-12.
  • 6Biham E, Dunkelman O, Keller N. New Cryptanalytic Results on IDEA [C]//Xuejia Lai, Kefei chen. Lecture Notes in Computer Science. Berlin: Springer-verlag, 2006:412-427.
  • 7Piret G, Ouisquater J. A Differential Fault Attack Technique against SPN Structures, with Applications to the AES and KHAZAD [C]//Colin D Waiter, Cetin K. Koc, Christof Paar(Eds.). Lecture Notes in Computer Science. Berlin:Springer-verlag, 2003:77-88.
  • 8Schneier B. Applied Cryptography Second Edition:protocols, algorithm, and source code in C [M]. New York: John Wiley & Sons Inc, 1996: 282-283.
  • 9Meier W. On the Security of the IDEA Block Cipher [C]//Tor Helleseth. Lecture Notes in Computer Science. Berlin: Springer-verlag, 1994: 371-385.
  • 10国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法.http://www. oscca. gov. cn/UpFile/200621016423197990.pdf.

共引文献66

同被引文献6

  • 1张亮,沈沛意,肖潇,等.基于Xilinx FPGA的多核嵌入式系统设计基础[M].西安:西安电子科技大学出版社,2011.
  • 2HEMME L.A Differential Fault Attack Against Early Rounds of (Triple) Des[C]//In: Proceeding of Workshop on Cryptographic Hardware and Embedded Systems(CHES2OO4).Cambridge(Boston).USA:[s.n.], 2004:254-267.
  • 3ZOU Zhige. Layout and Circuit Extraction[EB/OL]. (2010-12-O1)[2013-05-O1].http://wenku. baidu, eom/ view/834a7487bceb19e8b8f6ba98, html.
  • 4李海斌,周玉洁.一种抗DPA攻击的DES设计[J].通信技术,2007,40(11):277-279. 被引量:9
  • 5蒋烨,薛质,王轶骏.非接触式IC卡干扰式旁路攻击与防护[J].信息安全与通信保密,2008,30(3):52-54. 被引量:2
  • 6张修丽,陈诚.一种抗DPA的AES的设计[J].信息安全与通信保密,2009,31(11):63-65. 被引量:2

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部