期刊文献+

物联网环境下LED轻量级密码算法的安全性分析 被引量:26

Security Analysis of the LED Lightweight Cipher in the Internet of Things
下载PDF
导出
摘要 LED算法是于2011年CHES会议中提出的一种新型轻量级密码算法,用于在物联网环境下保护RFID标签以及智能卡等设备的通信安全.文中提出并讨论了一种针对LED算法的差分故障攻击方法.该方法采用面向半字节的随机故障模型,通过在LED算法中导入故障,分别仅需要3个错误密文和6个错误密文,即可恢复LED算法的64bit和128bit原始密钥.实验结果表明,针对LED算法的差分故障攻击方法不仅扩展了故障诱导的攻击范围,而且提高了故障诱导的效率,减少了错误密文数,从而为故障攻击其它轻量级密码算法提供了一种通用的分析手段. LED,proposed in CHES 2011,is a new lightweight cipher which is applied in the Internet of Things to provide security for RFID tags and smart cards etc.On the basis of the half byte-oriented fault model and the differential analysis,a differential fault analysis on the LED cipher by inducing faults is proposed.Simulating experiment shows that our attack could recover its 64-bit secret key by introducing 3 faulty ciphertexts,and recover 128-bit secret key by introducing 6 faulty ciphertexts,respectively.Our method extends the attacking scope of faults,thereby increasing the efficiency of fault injection and decreasing the number of faulty ciphertexts.Thus,the results in this study will also be beneficial to the analysis of other lightweight ciphers.
出处 《计算机学报》 EI CSCD 北大核心 2012年第3期434-445,共12页 Chinese Journal of Computers
基金 国家自然科学基金(61003278 61073150) 上海市信息安全综合管理技术研究重点实验室开放课题资助基金 中央高校基本科研业务费专项资金资助~~
关键词 物联网 RFID 轻量级密码算法 LED 差分故障分析 Internet of Things RFID lightweight cipher algorithm LED Differential fault analysis
  • 相关文献

参考文献2

二级参考文献19

  • 1Courtois N T, Bard G V , Wagner D. Algebraic and slide attacks on KeeLoq // Proceedings of Fast Software Eneryption 2005: LNCS 5086. Heidelberg: Springer- Verlag, 2005 : 97-115.
  • 2Indesteege S, Keller N, Dunkelman O, et al. A practical attack on KeeLoq// Smart N P. EUROCRYPT 2008 : LNCS 4965. Heidelberg: Springer-Verlag, 2008 : 1-18.
  • 3Eisenbarth T, Kasper T, Moradi A, et al. On the power of power analysis in the real world : a complete break of the KeeLoq code hopping scheme // Wagner D. CRYPTO 2008: LNCS 5157. Heidelberg: Springer- Verlag, 2008:203-220.
  • 4Kasper M, Kasper T, Moradi A, et al. Breaking KeeLoq in a flash: on extracting keys at lightning speed // Preneel B. AFRICACRYPT 2009, LNCS 5580. Heidelberg: Springer, 2009:403-420.
  • 5Paar C, Eisenbarth T, Kasper M, et al. KeeLoq and side-channel analysis-evolution of an attack // 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography. Washington: IEEE Computer Society, 2009 : 65- 69.
  • 6Microchip. AN642: code hopping decoder using a PIC16C56 [ EB/OL ]. (2010-04-10) [2010-04-10] http: // www. keeloq, boom. ru/decryption, pdf.
  • 7Bogdanov A. Linear slide attacks on the KeeLoq block cipher // The 3rd SKLOIS Conference on Information Security and Cryptology: LNCS 4586. Heidelberg: Springer-Verlag, 2007 : 1-10.
  • 8国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法.http://www. oscca. gov. cn/UpFile/200621016423197990.pdf.
  • 9Boneh D. , DeMillo R. A. , Lipton R. J.. On the importance of checking cryptographic protocols for faults. In: Proceedings of the EUROCRYPT'97, Konstanz, Germany, 1997, 37-51
  • 10Biham E. , Shamir A.. Differential fault analysis of secret key cryptosystems. In: Proceedings of the CRYPTO' 97, Santa Barbara, California, USA, 1997, 513-525

共引文献71

同被引文献205

引证文献26

二级引证文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部