期刊文献+

对流密码Helix的代数故障攻击 被引量:1

Algebraic fault attack on Helix
下载PDF
导出
摘要 对Helix流密码算法首次提出一种代数故障攻击方法。将代数攻击和差分故障攻击结合,对Helix算法中的模加运算结构提出了一种通用的代数故障攻击模型,通过选择明文和故障注入,构建了Helix在该模型下的代数方程组,使用CryptoMiniSAT解析器求解方程组系统恢复密钥信息。实验结果表明,580次故障注入即可恢复Helix工作密钥除最高位外的248比特信息,剩余8比特密钥信息可以通过穷举得到。针对模2n加运算所提出代数故障攻击模型可以为其他流密码安全性分析提供一定的参考。 An algebraic fault attack method on Helix is first proposed. The attack combines algebraic attack with differential fault attack, firstly a general model to attack the differential equations of addition is proposed. Secondly, the algebraic equation system of Helix under the model is built by choosing different plaintexts and inserting random faults. Finally, the key is recov- ered by solving the equation system with the CryptoMiniSAT solver. Experimental results show that it can recover the 248 bits of the working keys and the rest 8 bits can recovered by exhaustive research. The model can is applied to other stream ciphers with its versatility and solving conveniently.
出处 《计算机工程与设计》 CSCD 北大核心 2014年第2期445-450,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(61173191)
关键词 差分故障攻击 代数攻击 代数故障攻击 模加方程 HELIX differential fault attack algebraic attack algebraic fault attack differential equations of addition Helix
  • 相关文献

参考文献9

  • 1郑斌,关杰.“与密钥模2*加运算”的差分性质研究[J].电子信息学报,2009,26(2):132-136.
  • 2Courtois N, Ware D, Jackson K. Fault-algebraic attacks on in- ner rounds of DES [C] //eSmart, 2010:22 24.
  • 3Mohamed M, Bulygin S. Using SAT ,solving to improve differential fault analysis of trivium [J]. International Journal Security and lts Applications, 2012, 6 (1): 29-37.
  • 4Faure G, Nieuwenhuis R, Oliveras A, et al. SAT modulo the theory of linear arithmetic Extract, inexact and commercial solvers [G]. LNCS 4996.. SAT, 2008: 77-90.
  • 5Yossed O, Mario K, Thomas P, et al. Side-channel analysis in the presence of errors [C] // CHES. USA: California, 2010: 428-442.
  • 6Sugita M, Kawazoe M, Imai H. Relation between XL algorithm and Gr6bner basis algorithms [EB/OL]. bttp://eprint, iacr. org/112, 2010.
  • 7李卷孺,谷大武.PRESENT算法的差分故障攻击[C]//中国密码学会,2009:3-13.
  • 8Courtois N, Debraize B. Algebraic description and simultaneous linear approximations of addition in snow 2.0 [C] // ICICS, 2008:328 344.
  • 9ZHANG Zhongya. Security analysis on block-like type stream ciphers [D]. Zhengzhom PLA Information Engineering Uni versity Master Dissertation, 2011:47 49 (in Chinese).

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部