期刊文献+

SHACAL-2~*算法的差分故障攻击

Differential fault analysis on SHACAL-2
下载PDF
导出
摘要 采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512 bit的种子密钥需要204个随机故障。SHACAL-2*算法可以找到两个有效的差分故障位置,而SHACAL-2算法只有一个有效的差分故障位置。因此,从实施差分故障攻击的难易程度看,SHACAL-2*算法抵抗差分故障攻击的能力弱于SHACAL-2算法。 This paper used the technique of differential fault attack on the SHACAL- 2 * based on word-oriented fault model. Both theoretical results and experimental data demonstrate that 160 random faults are needed to obtain 512 bit key with suc- cessful probability more than 60% , while 204 random faults are needed to obtain 512 bit key with successful probability more than 97%. The paper found two effective differential fault positions in the SHACAL-2* , while one could be found in the SHACAL-2. Therefore,according to the difficulty degree of carrying out differential fault attack, SHACAL-2* is weaker than SHACAL-2 in the aspect of resistance differential fault attack.
出处 《计算机应用研究》 CSCD 北大核心 2014年第10期3122-3124,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(61103192) 国家"973"计划资助项目(2013CB338002)
关键词 随机故障模型 SHACAL-2*算法 差分故障攻击 random fault model SHACAL-2* algorithm differential fault attack
  • 相关文献

参考文献9

二级参考文献73

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2Boneh D, DeMillo R A, and Lipton R J. On the importance of checking cryptographic protocols for faults.EUROCRYPT'97, Konstanz, Germany, 1997, LNCS 1233: 37-51.
  • 3Biham E and Shamir A. Differential fault analysis of secret key cryptosystems. CRYPTO'97, California, USA, 1997, LNCS 1294: 513-525.
  • 4Biehl I, Meyer B, and Milller V. Differential fault attacks on elliptic curve cryptosystems. CRYPTO 2000, California, USA, 2000, LNCS 1880: 131-146.
  • 5Hemme L. A differential fault attack against early rounds of (Triple-) DES. Cryptographic Hardware and Embedded Systems-CHES 2004. Boston, 2004, LNCS 3156: 254-267.
  • 6Li Wei, Gu Da-wu, and Li Juan-ru. Differential fault analysis on the ARIA algorithm. Information Sciences, 2008, 178(19): 3727-3737.
  • 7Chen Hua, Wu Wen-ling, and Feng Deng-guo. Differential fault analysis on CLEFIA. International Conference on Information and Communication Security-ICICS 2007, Zhengzhou, China, 2007, LNCS 4861: 284-295.
  • 8Piret G and Quisquater J J. A differential fault attack technique against SPN Structures, with Application to the AES and KHAZAD. Cryptographic Hardware and Embedded Systems-CHES 2003.Cologne, 2003, LNCS 2779: 77-88.
  • 9NIST. FIPS-180-2: Secure Hash Standard(SHS). 2002.
  • 10Boneh D, DeMillo R, Lipton R. On the Importance of Checking Cryptographic Protocols for Faults[C]//Proc. of Cryptology- Eurocrypt'97. Konstanz, Germany: [s. n.], 1997.

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部