期刊文献+

故障模型下MORUS算法的差分扩散性质研究 被引量:2

Research on Differential Diffusion Property of MORUS in Fault Model
下载PDF
导出
摘要 MORUS算法是由H.Wu等人设计的一类认证加密算法,目前已顺利进入CAESAR竞赛第3轮竞选.研究MORUS算法故障模型下的差分扩散性质.采用面向比特的随机故障模型,结合差分分析技术与中间相遇思想,改进了针对MORUS算法的差分链搜索算法.运用该算法找到了5步概率为2^(-85)的差分链,从而实现了对初始化过程5步的简化版MORUS-640-128算法的差分-区分攻击,攻击所需的数据量和区分优势分别为2^(89)和0.99965.最后,利用差分故障分析方法对认证过程3步的简化版MORUS-640-128算法进行了伪造攻击. MORUS is a third-round CAESAR candidate of authenticated cipher designed by H. Wu et al. With a fault model,the diffusion property of MORUS is analyzed in this paper. By using a bit-oriented random fault model,the search algorithm for the differential chain of MORUS is improved with the usage of differential analysis and meet-in-the-middle technique. Through this algorithm,a 5-step differential chain is discovered with a probability of 2^-85. The differential-distinguish attack on the initialization of 5-step reduced version of MORUS-640-128 is proposed with the data complexity of 2^89 and the distinguishing advantage of 0.99965. By using differential fault analysis method,the forgery attack on 3-step authentication of MORUS-640-128 is formed.
作者 施泰荣 关杰 李俊志 王森鹏 SHI Tai-Rong;GUAN Jie;LI Jun-Zhi;WANG Sen-Peng(Information Engineering University,Zhengzhou 450001,China)
机构地区 信息工程大学
出处 《软件学报》 EI CSCD 北大核心 2018年第9期2861-2873,共13页 Journal of Software
基金 国家自然科学基金(61572516 61602514)~~
关键词 CAESAR竞赛 MORUS算法 差分故障分析 中间相遇 CAESAR competition MORUS differential fault attack meet in the middle
  • 相关文献

参考文献4

二级参考文献39

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:66
  • 2Boneh D, DeMillo R A, and Lipton R J. On the importance of checking cryptographic protocols for faults.EUROCRYPT'97, Konstanz, Germany, 1997, LNCS 1233: 37-51.
  • 3Biham E and Shamir A. Differential fault analysis of secret key cryptosystems. CRYPTO'97, California, USA, 1997, LNCS 1294: 513-525.
  • 4Biehl I, Meyer B, and Milller V. Differential fault attacks on elliptic curve cryptosystems. CRYPTO 2000, California, USA, 2000, LNCS 1880: 131-146.
  • 5Hemme L. A differential fault attack against early rounds of (Triple-) DES. Cryptographic Hardware and Embedded Systems-CHES 2004. Boston, 2004, LNCS 3156: 254-267.
  • 6Li Wei, Gu Da-wu, and Li Juan-ru. Differential fault analysis on the ARIA algorithm. Information Sciences, 2008, 178(19): 3727-3737.
  • 7Chen Hua, Wu Wen-ling, and Feng Deng-guo. Differential fault analysis on CLEFIA. International Conference on Information and Communication Security-ICICS 2007, Zhengzhou, China, 2007, LNCS 4861: 284-295.
  • 8Piret G and Quisquater J J. A differential fault attack technique against SPN Structures, with Application to the AES and KHAZAD. Cryptographic Hardware and Embedded Systems-CHES 2003.Cologne, 2003, LNCS 2779: 77-88.
  • 9NIST. FIPS-180-2: Secure Hash Standard(SHS). 2002.
  • 10ECRYPT.eSTREAM:ECRYPT Stream Cipher Project,IST2002-507932[EB/OL].http://www.ecrypt.eu.org/stream,2005-04-12.

共引文献24

同被引文献14

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部