期刊文献+

轻量级分组密码SIMON代数故障攻击 被引量:1

Algebraic fault attack on lightweight block ciphers SIMON
下载PDF
导出
摘要 针对SIMON现有故障攻击中存在的故障深度小、手工推导复杂等问题,给出一种代数故障攻击(AFA)方法。首先给出SIMON核心运算‘&’代数表示方法并构建全轮正确加密代数方程组;其次注入故障并将故障信息表示为代数方程,提供故障已知和故障未知两种模型,给出两种模型故障表示方法;最后利用Crypto Minisat-2.9.6解析器求解方程组恢复密钥。实验结果表明:利用单比特故障对SIMON32/64进行攻击,故障位置选取第26轮,故障已知和未知模型仅需5个和6个故障即可恢复全轮密钥;利用n比特宽度故障对SIMON128/128进行攻击,故障位置选取第65轮,两种模型均只需2个故障即可恢复全轮密钥。此外,对比故障已知和未知模型发现,随故障数递增密钥求解时间的决定因素将由故障信息量变为方程组计算量。 To solve the problems of small fault depth and complex manual deduction in previous fault attacks on SIMON, an Algebraic Fault Attack (AFA) method was proposed. Firstly, Correct equations of full-round SIMON encryption was established based on the algebraic representation of SIMON core operation ' &'. Then faults were injected into the internal states and two models were provided for fault representation based on whether attackers knew the exact fault information or not. Finally, a CryptoMinisat-2.9.6 solver was used for round-keys recovery. The simulation results show that the fault-known and fault-unknown model need 5 and 6 faults to recover the entire key set with single-bit faults injected in the 26th round of SIMON32/64. As for SIMON128/128, two models both need only 2 faults to recover the entire key set with n-bit length faults injected in the 65th round. Moreover, it can be found that the influencing factor of average solving time will change from fault information to computation with fault number growing.
出处 《计算机应用》 CSCD 北大核心 2017年第7期1953-1959,共7页 journal of Computer Applications
基金 国家自然科学基金资助项目(61272491 61309021 61472357)~~
关键词 SIMON 故障攻击 代数攻击 代数故障攻击 轻量级分组密码 SIMON fault attack algebraic attack Algebraic Fault Attack (AFA) lightweight block cipher
  • 相关文献

参考文献3

二级参考文献53

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2DONEH D, DEMILLO R, LIPTON R. On the importance of checking cryptographic protocols for faults[A]. Eurocrypt'97[C]. Konstanz, Germany, 1997.37-51.
  • 3BIHAM E, SHAMIR A. Differential fault analysis of secret key cryptosystems[A]. Crypto'97[C]. Santa Barbara, California, USA, 1997.513-525.
  • 4DEBDEEP M. An improved fault based attack of the advanced en- cryption standard[A]. AFRICACRYPT 2009[C]. Gammarh, Tunisia, 2009. 421-434.
  • 5ZHAO X J, WANG T. Further improved differential fault analysis on camellia by exploring fault width and depth[EB/OL], http://eprint, iacr org/2010/026.pdf, 2010.
  • 6LI W, GU D W, LI J R. Differential fault analysis on the ARIA algo- rithmlJ1. Information Sciences. 2008,178(19):3727 - 3737.
  • 7NICOLAS T C, JOSEF P. Cryptanalysis of block ciphers with over- defined systems of equations[A]. ASIACRYPT 2002[C]. Berlin Hei- delberg, 2002. 267-287.
  • 8MATHIEU R, FRANCOIS-X S. Algebraic side-channel attacks[A]. INSCRYPT 2009[C]. California, USA, 2009. 393-410.
  • 9MATHIEU R, FRANCOIS-X, NICOLAS V-C. Algebraic side-channel attacks on the AES: Why time also matters in DPA[A]. CHES 2009[C]. California, USA, 2009.97-111.
  • 10李卷孺,谷大武.PRESENT算法的差分故障攻击[A].中国密码学会2009年会[c].中国,北京,2009.3-13.

共引文献16

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部