期刊文献+

基于故障信息的SOSEMANUK猜测确定攻击 被引量:1

Fault-based guess-and-determine attack on SOSEMANUK
原文传递
导出
摘要 针对SOSEMANUK流密码已有攻击方法复杂度过高的不足,提出并讨论了一种基于故障信息的猜测确定攻击方法.首先利用代数方法构建密码在比特层面的等效代数方程组,然后向密码注入随机单字故障,在深入分析故障传播特征的基础上,将故障信息表示成代数方程组并猜测密码部分内部状态,使用CryptoMinisat解析器求解代数方程组恢复密码初始内部状态.实验结果表明:对密码首轮加密进行攻击,恢复密码全部初始内部状态所需的故障注入次数为20次,计算复杂度为O(296),对密码前两轮加密进行攻击,无须猜测密码内部状态,仅注入10个单字故障即可恢复密码全部初始内部状态.与已有结果相比,新方法攻击复杂度显著降低. The SOSEMANUK stream cipher is a member of the finalists of the eSTREAM project.In this paper,the previous known attacks against SOSEMANUK was presented and discussed.Firstly,SOSEMANUK was described as a set of equations involving the public and key variables at bit level.Secondly,the attacker was assumed to be able to fault a random inner state word and the faults were described as a set of equations by analyzing the propagation of faults.Thirdly,the CryptoMinisat solver was adapted to recover the secret inner state by guessing certain inner state words and solving the combined equations.The results show that the first round attack recovers the secret internal states,requires 20 faults and the computational complexity is dramatically reduced to O(296).The first two rounds attack recovers the whole states,requires 10 faults without guessing any inner state word,which is better than the previous known cryptanalytic results.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2017年第2期72-77,共6页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(61173191 61272491 61309021) 中央高校基本科研业务费专项资金资助项目(2015QNA5005)
关键词 流密码 SOSEMANUK 猜测确定攻击 故障注入 CryptoMinisat解析器 stream cipher SOSEMANUK guess-and-determine attack fault injection CryptoMinisat solver
  • 相关文献

参考文献3

二级参考文献31

  • 1The eSTREAM project [EB/OL]. [2012 - 2 - 11]. http:// www. ecrypt. eu. org/stream/.
  • 2Berbain C, Billet O, Canteaut A, et al. SOSEMANUK: A stream cipher[ M ]//New Stream Cipher Designs :The eSTREAM Finalists. Berlin, Germany: Springer- Verlag, 2008.
  • 3Ekdahl P, Johansson T. A new version of the stream cipher SNOW [ C ]//Proceedings of SAC ' 03. Berlin, Germany: Springer - Verlag, 2003.
  • 4Biham E, Anderson R, Knudsen L. SERPENT: A new block cipher proposal [ C ]//Proceedings of FSE' 98, LNCS 1372, Springer, 1998 : 222 -238.
  • 5Hawks P, Rose G. Guess and determine attacks on SNOW [ C ]// Proceedings of SAC 2002, LNCS 2595, Springer, 2003 : 37 - 46.
  • 6Cannier C D. Guess and determine attacks on SNOW [EB/OL]. [2012 -02 -011 ]. http://www. cryptonessie. org.
  • 7Ahmadi H, Eghlidos T, Khazaei S. Impr-oved guess and determine attack on SOSEMANUK [ EB/OL]. [ 2012 - 02 - 11 ]. http://www. ecrypt. eu. org/stream/papersdir/085. pdf.
  • 8Tsunoo Y, Saito T, Shigeri M, et al. Evaluation of SOSEMANUK with regard to guess and determine attacks [ EB/ OL]. [2012-01-02].http ://www. ecrypt.eu. org/stream/papersdir/2006/009. pdf.
  • 9Ding L, Guan J. Guess and determine attack on SOSEMANUK [C]//Proceedings of ISA'09, Xi' an, China, 2009.
  • 10Feng X, Liu J, et al. A Byte-based guess and determine attack on SOSEMANUK [ C ]//Proceedings of ASIACRYPT 2010, LNCS 6477, Springer, 2010: 146-157.

共引文献19

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部