期刊文献+

SIMECK密码代数故障攻击研究

On algebraic fault attack against SIMECK cipher
下载PDF
导出
摘要 针对SIMECK密码给出一种代数故障攻击方法。首先给出SIMECK加密轮函数和密钥生成策略等效代数方程创建方法;分别设定故障已知模型和故障未知模型,并在故障未知模型下提出基于故障注入差分和基于正确/故障密文差分确定故障索引值两种策略创建故障信息方程;利用基于SAT问题求解方程组。结果表明,在SIMECK32/64第24轮注入单比特翻转故障,故障已知模型和基于故障注入差分的故障未知模型均仅需两次注入即可恢复完整64bit主密钥;在第27轮注入故障,基于密文差分的未知模型需九次注入可恢复完整主密钥。与已有研究相比,该攻击密钥搜索复杂度更低,所需故障注入样本量更少。 This paper evaluated the security of SIMECK using the algebraic fault analysis. Firstly, it gave the method of creating equivalent algebraic equations of SIMECK encryption round function and key generation strategy. Secondly, it designed the known fault model and stochastic fault model respectively, and proposed two strategies based on the differential value of fault injected and the fault index determined by differential value of ciphertext to create equivalent equations of fault information under the unknown model. Finally, it solved equations based on the SAT problem. Experimental results show that after injecting single-bit fault to the 24th round of SIMECK32/64, the fault known model and the fault unknown model based on differential value of the fault injection, only 2 injections can recover the full 64 bit master keys. And 9 injections needed for the fault unknown model based on the differential value of ciphertext after injecting single-bit fault to the 27th round. The method's complexity of searching key is simpler and its fault injection sample required is less compared with the previous research.
作者 黄长阳 王韬 陈浩 王晓晗 马云飞 陈财森 Huang Changyang;Wang Tao;Chen Hao;Wang Xiaohan;Ma Yunfei;Chen Caisen(Army Engineering University of PLA, Shijiazhuang 050003, China;College of Armoured Force Engineering of PLA, Beijing 100072, China)
出处 《计算机应用研究》 CSCD 北大核心 2019年第7期2184-2189,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(61272491,61309021,61402528)
关键词 故障攻击 代数故障攻击 SIMECK算法 轻量级分组密码 故障模型 fault attack algebraic fault attack SIMECK algorithm lightweight block cipher fault model
  • 相关文献

参考文献3

二级参考文献44

  • 1BONEH D, DEMILLO R A, LIPTON R J. On the importance of checking cryptographic protocols for faults[ C ]//Advances in Cryptol- ogy. Berlin: Springer, 1997: 37-51.
  • 2BIHAM E, SHAMIR A. Differential fault analysis of secret key crypto- system[ C ]//Advances in Cryptology. Berlin : Springer, 1997 : 513- 525.
  • 3BIEHL I, MEYER B, MULLER V. Differential fault analysis on el- liptic curve cryptosystems [ C ]//Advances in Cryptology. Berlin: Springer, 2000 : 131-146.
  • 4PIRET G, QUISQUATER J J. A differential fault attack technique a- gainst SPN structures, with application to the AES and KHAZAD [ C ]//Proc of Cryptographic Hardware and Embedded Systems. Ber- lin: Springer, 2003: 77-88.
  • 5MUKHOPADHYAY D. An improved fault based attack of the ad- vanced encryption standard [ C ]//Progress in Cryptology. Berlin: Springer, 2009: 421-434.
  • 6BIHAM E, GRANBOULAN L, NGUYN P Q. Impossible fault analy- sis of RC4 and differential fault analysis of RC4 [ C ]//Proc of Fast Software Encryption. Berlin : Springer,2005 : 359- 367.
  • 7COURTOIS N T, PIEPRZYK J. Cryptanalysis of block ciphers with over-defined systems of equations[ C]//Advances in Cryptology. Ber- lin: Springer, 2002 : 267-287.
  • 8COURTOIS N T, WARE D, JACKSON K. Fault-algebraic attacks on inner rounds of DES [ C ]//Future of Digital Security Technologiese. Berlin: Springer, 2010 : 22-24.
  • 9GUO J, PEYRIN T, POSCHMANN A, et al. The LED block cipher [ C ]//Proc of Cryptographic Hardware and Embedded Systems. Ber- lin: Springer, 2011 : 326-341.
  • 10SOOS M, NOHL K, CASTELLUCCIA C. Extending SAT solvers to cryptographic problems [ C ]//Proc of International Conference on Theory and Applications of Satisfiability Testing. Berlin: Springer, 2009 : 244-257.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部