期刊文献+

Salsa20的差分故障分析

Differential Fault Analysis of Salsa20
下载PDF
导出
摘要 Salsa20是eSTREAM计划最终获胜算法之一,其主要特征是利用模加、异或和循环移位三种运算的混合提供算法所需扩散性和混淆性。目前对该算法的分析主要集中在统计分析和差分分析两方面。本文研究Salsa20/256的差分故障分析,在基于随机字的故障诱导模型下,通过诱导96个错误,将以近似1的概率获得186比特的密钥信息,从而将恢复Salsa20/256全部密钥比特的时间复杂度降为270,这表明Salsa20/256对基于随机字的差分故障分析是脆弱的。 Salsa20 is one of the finalists of the eSTREAM project. Its main feature is using the ARX operations (i. e. addition, rotation, and xor on 32-bit words) to achieve good confusion and diffusion effects. At present, many cryptanalytic results on it are statistical cryptanalysis and differential crypta- nalysis. In this paper, we further investigate a differential fault analysis of Salsa20/256. By adopting a random fault word model, when inducing 96 faults,the 186 bit key can be recovered with a probability close to 1 ,accordingly the complexity of recovering the full key bits of Salsa20/256 can be reduced to 2^70 , which implies that Salsa20/256 is sensitive to the differential fault analasis.
出处 《计算机工程与科学》 CSCD 北大核心 2011年第3期7-12,共6页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60803156) 信息安全国家重点实验室开放基金资助课题(01-07)
关键词 流密码 Salsa20 差分故障分析 stream cipher Salsa20 differential fault analysis
  • 相关文献

参考文献19

  • 1Biham E,Shamir A. Differential Fault Analysis of Secret Key Cryptosystems[C]//Proc of CRYPTO'97,1997 : 513 525.
  • 2Piret G, Quisquater J J. A Differential Fault Attack Tech- nique Against SPN Structures, with Application to the AES and Khazad[C]//Proc of CHES' 03,2003 : 77-88.
  • 3Mukhopadhyay D. An Improved Fault Based Attack of the Advanced Encryption Standard [C] // Proc of AFRI- CACRYPT' 09, 2009 : 421-434.
  • 4ZHOU Yongbin WU Wenling XU Nannan FENG Dengguo.Differential Fault Attack on Camellia[J].Chinese Journal of Electronics,2009,18(1):13-19. 被引量:15
  • 5张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 6Li Wei, Gu Dawu, Li Juanru. Differential Fault Analysis on the ARIA Algorithm [J]. Information Sciences, 2008, 178 (19) :3727-3737.
  • 7Hoch J, Shamir A. Fault Analysis of Stream Ciphers[C]// Proc of CHES'04,2004:240 253.
  • 8Biham E, Granboulan L, Nguyen P Q. Impossible Fault A nalysis of RC4 and Differential Fault Analysis of RC4 [C]// Proc of FSE' 05,2005 : 359-367.
  • 9Hojs'l k M, Rudolf B. Differential Fault Analysis of Trivium ECJ//Proc of FSE'08, 2008:158 172.
  • 10Hois'Ik M, Rudolf B. Floating Fault Analysis of Trivium [C]//Proc of INDOCRYPT' 08,2008 : 239-250.

二级参考文献11

  • 1国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法.http://www. oscca. gov. cn/UpFile/200621016423197990.pdf.
  • 2Boneh D. , DeMillo R. A. , Lipton R. J.. On the importance of checking cryptographic protocols for faults. In: Proceedings of the EUROCRYPT'97, Konstanz, Germany, 1997, 37-51
  • 3Biham E. , Shamir A.. Differential fault analysis of secret key cryptosystems. In: Proceedings of the CRYPTO' 97, Santa Barbara, California, USA, 1997, 513-525
  • 4Biehl I. , Meyer B. , Muller V.. Differential fault attacks on elliptic curve cryptosystems. In: Proceedings of the CRYPTO 2000, Santa Barbara, California, USA, 2000, 131- 146
  • 5Blomer J. , Seifert Jean Pierre. Fault based cryptanalysis of the advanced encryption standard (AES). In: Wright R. N. ed.Financial Cryptography-FC 2003. Lecture Notes in Computer Science 2742. Berlin: Springer-Verlag, 2003, 162- 181
  • 6Giraud C.. DFA on AES. In: Dobbertin H. , Rljmen V.Sowa A. eds. Advanced Eneryption Standard 4-AES 2004. Lecture Notes in Computer Science 3373. Berlin: Springer Verlag, 2005, 27-41
  • 7Chen Chien-Ning, Yen Sung-Ming. Differential fault analysis on AES key schedule and some countermeasures. In: Proceedings of the Australasian Conference on Information Security and Privacy-ACISP 2003, Wollongong, Australia, 2003, 118- 129
  • 8Dusart P. , Letourneux G. , Vivolo O.. Differential fault analysis on AES. In: Zhou J., Yung M. , Han Y.. eds.. Applied Cryptography and Network Security-ACNS 2003. Lecture Notes in Computer Science 2846. Berlin: Springer-Verlag,
  • 9Heroine L.. A differential fault attack against early rounds of(Triple-) DES. In: Joye Marc, Quisquater Jean-Jacques eds.Cryptographic Hardware and Embedded Systems CHES 2004.Lecture Notes in Computer Science 3156. Berlin: Springer-Verlag, 2004, 254-267
  • 10Hoch Jonathan J. , Shamir A: Fault analysis of stream ciphers. In:Joye Marc, Quisquater Jean Jacques eds. Cryptographic Hardware and Embedded Systems-CHES 2004. Lecture Notes in Computer Science 3156. Berlin: Springer-Vetlag, 2004, 240-253

共引文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部