期刊文献+

一类SPN结构密码设备的故障注入攻击技术(英文)

A Fault Injection Attack Technique on Devices with Some SPN Structures
下载PDF
导出
摘要 提出了一种有效的故障注入攻击技术,能够攻击一类使用特定结构SPN密码的设备.这种攻击方法基于字节错误模型,仅需要少量故障密文即可攻破一类具有特定置换层的SPN密码算法.分析给出了故障和特定置换层如何导致秘密信息泄露的原因.同时,对于具体的密码算法ARI-A和PRESENT进行了攻击实例. We propose an efficient fault injection attack technique that could be used to break devices with certain types of SPN structures. The attack is on the basis of the byte-oriented fault model and requires very few faulty cipher texts to break SPN structures with certain type of permutation layer. Analysis is given to reveal how fault occurred position and permutation layer design leak the secret information. We also give attack implementation on ARIA and some other block ciphers with particular permutation layer design.
出处 《北京交通大学学报》 CAS CSCD 北大核心 2010年第5期154-158,共5页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 国家自然科学基金资助项目(61073150) SafeNet东北亚高校合作计划项目资助
关键词 故障注入 密码分析 旁路攻击 差分故障攻击 fault injection cryptanalysis side channel attacks differential fault attack
  • 相关文献

参考文献14

  • 1Biham E, Shamir A. Differential Cryptanalysis of DES- Like Cryptosystems [ J]. Journal of Cryptology, 1991,4 (1): 3-72.
  • 2Mitsuru Matsui. Linear Cryptanalysis Method for DES Cipher[ C]//Workshop on the Theory and Apphcation of Cryptographic Techniques on Advances in Cryptology Table of Contents, 1994: 386- 397.
  • 3Kelsey J, Schneier B, Wagner D, et al. Side Channel Cryptanalysis of Product Ciphers[ C]//The European Symposium on Research in Computer Security-ESORICS' 98, Lecture Notes in Computer Science, 1998, 1485:97 - 110.
  • 4Ors S B, Gurkaynak F, Oswald E, et al. Power-Analysis Attack on An ASIC AES Implementation[ C]//Proceedings of Information Technology : Coding and Computing, 2004: 546 - 552.
  • 5Osvik D A, Shamir A, Tromer E. Cache Attacks and Countermeasures: The Case of AES[J]. Lecture Notes in Computer Science, 2006, 3860:1 - 20.
  • 6Boneh D, DeMillo R A, Lipton R J. On the Importance of Checking Cryptographic Protocols for Faults [J]. Lecture Notes in Computer Science, 1997, 1233: 37- 51.
  • 7Boneh D, DeMillo R A, Lipton R J. On the Importance of Ehminating Errors in Cryptographic Computations [ J]. Journal of Cryptology,2001,14(2) : 101 - 120.
  • 8Biham E, Shamir A. Differential Fault Analysis of Secret Key Cryptosystems[J]. Lecture Notes in Computer Science, 1997, 1294:513 - 525.
  • 9Dusart P, Letourneux G, Vivolo O. Differential Fault Analysis on AES[J]. Apphed Cryptography and Network Security, Lecture Notes in Computer Science, 2003, 2846:293 - 306.
  • 10Piret G, Quisquater J J. A Differential Fauh Attack Technique Against SPN Structures, with Application to the AES and KHAZAD [ C ]//Cryptographic Hardware and Embedded Systems-CHES 2003. Lecture Notes in Computer Science, 2003, 2779: 77- 88.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部