期刊文献+

PRESENT代数故障攻击的改进与评估 被引量:4

Improvement and evaluation for algebraic fault attacks on PRESENT
下载PDF
导出
摘要 提出了一种基于代数分析的PRESENT故障攻击改进方法,将代数分析用于密码和故障方程构建,通过逆向构建加密方程来加快求解速度;提出了一种故障注入后的密钥剩余熵评估方法,可评估不同故障模型下的PRESENT抗故障攻击安全性;最后对智能卡上的8位智能卡上的PRESENT实现进行了时钟毛刺故障注入,最好情况下1次故障注入即可恢复主密钥,这是PRESENT故障攻击在数据复杂度上的最好结果。 An enhanced algebraic fault analysis on PRESENT was proposed. Algebraic cryptanalysis was introduced to build the algebraic equations for both the target cipher and faults. The equation set of PRESENT was built reversely in order to accelerate the solving speed. An algorithm of estimating the reduced key entropy for given amount of fault injections was proposed, which can evaluate the resistance of PRESENT against fault attacks under different fault models. Finally, extensive glitch-based fault attacks were conducted on an 8-bit smart card PRESENT implemented on a smart card. The best results show that only one fault injection was required for the key recovery, this is the best result of fault attacks on PRESENT in terms of the data complexity.
出处 《通信学报》 EI CSCD 北大核心 2016年第8期144-156,共13页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(No.2013CB338004) 国家自然科学基金资助项目(No.61173191 No.61271124 No.61272491 No.61309021 No.61472357 No.61571063) 中央高校基本科研专项基金资助项目(No.2015QNA5005) 保密通信重点实验室基金资助项目(No.9140C110602150C11053)~~
关键词 代数分析 轻量级分组密码 故障攻击 可满足性求解 时钟毛刺 algebraic cryptanalysis, lightweight block cipher, fault attack, satisfiability solving, clock glitch
  • 相关文献

参考文献28

  • 1BOGDANOV A, KNUDSEN L R, LEANDER G, et al. PRESENT: anul-tra-lightweight block cipher[C]//CHES 2007. Vienna, Austria,c2007: 450-466.
  • 2BOGDANOV A, LEANDER G, PAARC, et al. Hash functions andRFID tags; mind the gap[C]//CHES 2008. Washington, DC, USA,C2008: 283-299.
  • 3WANG M. Differential cryptanalysis of reduced-round PRESENT[C]//AFRICACRYPT 2008. Casablanca, Morocco, c2008: 40-49.
  • 4BLONDEAU C,NYBERG K. New links between differential andlinear cryptanalysis[C]//EUROCRYPT 2013. Athens, Greece, c2013:388-404.
  • 5BLONDEAU C, NYBERG K. Links between truncated differentialand multidimensional linear properties of block ciphers and underlyingattack complexities[C]//EUROCRYPT 2014. Athens, Greece, c2014:165-182.
  • 6NAKAHARA J, SEPEHRDAD P, ZHANG B, et al. Linear (hull) andalgebraic cryptanalysis of the block cipher PRESENT[C]//CANS 2009.Ishikawa, Japan, c2009: 58-75.
  • 7CHO J Y. Linear cryptanalysis of reduced-round PRESENT[C]//CT-RSA2010. San Francisco, CA, USA, c2010: 302-317.
  • 8ALBRECHT M,CID C. Algebraic techniques in differential crypt-analysis[C]//FSE 2009. Leuven, Belgium, c2009: 193-208.
  • 9BLONDEAU C, PEYRIN T, WANG L. Known-key distinguisher onfull PRESENT [EB/OL]. http://eprint.iacr.org/2015/575.pdf, 2015.
  • 10ZHANG J, GU D W, GUO Z, et al. Differential power cryptanalysisattacks against PRESENT implementation[C]//ICACTE 2010. Chengdu,China, c2010: 661-665.

二级参考文献40

  • 1DONEH D, DEMILLO R, LIPTON R. On the importance of checking cryptographic protocols for faults[A]. Eurocrypt'97[C]. Konstanz, Germany, 1997.37-51.
  • 2BIHAM E, SHAMIR A. Differential fault analysis of secret key cryptosystems[A]. Crypto'97[C]. Santa Barbara, California, USA, 1997.513-525.
  • 3DEBDEEP M. An improved fault based attack of the advanced en- cryption standard[A]. AFRICACRYPT 2009[C]. Gammarh, Tunisia, 2009. 421-434.
  • 4ZHAO X J, WANG T. Further improved differential fault analysis on camellia by exploring fault width and depth[EB/OL], http://eprint, iacr org/2010/026.pdf, 2010.
  • 5LI W, GU D W, LI J R. Differential fault analysis on the ARIA algo- rithmlJ1. Information Sciences. 2008,178(19):3727 - 3737.
  • 6NICOLAS T C, JOSEF P. Cryptanalysis of block ciphers with over- defined systems of equations[A]. ASIACRYPT 2002[C]. Berlin Hei- delberg, 2002. 267-287.
  • 7MATHIEU R, FRANCOIS-X S. Algebraic side-channel attacks[A]. INSCRYPT 2009[C]. California, USA, 2009. 393-410.
  • 8MATHIEU R, FRANCOIS-X, NICOLAS V-C. Algebraic side-channel attacks on the AES: Why time also matters in DPA[A]. CHES 2009[C]. California, USA, 2009.97-111.
  • 9李卷孺,谷大武.PRESENT算法的差分故障攻击[A].中国密码学会2009年会[c].中国,北京,2009.3-13.
  • 10ZHAO X J, WANG T. Fault propagate pattern based DFA on SPN structure block ciphers using bitwise permutation, with application to PRESENT and PRINTcipher[EB/OL]. http://eprint.iacr.org/2011/089. pdf, 2011.

共引文献15

同被引文献17

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部