期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
对流密码Decim^(v2)差分故障攻击
1
作者 陈浩 王韬 刘会英 《小型微型计算机系统》 CSCD 北大核心 2015年第1期150-155,共6页
针对Decimv2流密码现有故障攻击方法未有效利用Decimv2非线性布尔函数差分特性导致攻击复杂度高的问题,提出一种改进的差分故障攻击方法,该方法充分利用Decimv2非线性布尔函数的差分特性,通过在Decimv2线性反馈移位寄存器LFSR中注入面... 针对Decimv2流密码现有故障攻击方法未有效利用Decimv2非线性布尔函数差分特性导致攻击复杂度高的问题,提出一种改进的差分故障攻击方法,该方法充分利用Decimv2非线性布尔函数的差分特性,通过在Decimv2线性反馈移位寄存器LFSR中注入面向比特的随机故障,构建算法内部状态的线性方程组,并对方程组进行求解恢复初始密钥K.实验结果表明,平均2个故障注入可恢复全部80比特初始密钥,所需密钥流为144比特,整个攻击计算复杂度由现有的O(242.5)减小为O(238.95).此外,该攻击方法可以为其他流密码差分故障攻击提供一定的参考. 展开更多
关键词 差分故障攻击 非线性布尔函数 流密码 Decimv2密码
下载PDF
Correlation power analysis of DECIM~v2 被引量:3
2
作者 JIA Yan-yan HU Yu-pu +1 位作者 ZHAO Yong-bin GAO Jun-tao 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第5期118-123,共6页
Power analysis has been a powerful and thoroughly studied threat for implementations of block ciphers and public key algorithms but not yet for stream ciphers. Based on the consumed power differences between two neigh... Power analysis has been a powerful and thoroughly studied threat for implementations of block ciphers and public key algorithms but not yet for stream ciphers. Based on the consumed power differences between two neighboring clock cycles, this paper presents a correlation power analysis (CPA) attack on the synchronous stream cipher DECIM^v2 (the tweaked version of the original submission DECIM). This attack resynchronizes the cryptographic device ceaselessly with many different initialization values (IVs) to obtain enough power traces. Then by modeling the statistical properties of the differential power traces with the correlation coefficients, the proposed attack algorithm can completely reveal the secret key of DECIM^v2. Furthermore, a simulation attack is mounted to confirm the validity of the algorithm. The results show that the entire secret key of DECIM^v2 can be restored within several minutes by performing 12 CPA attacks. It seems that there are still some defects in the design of DECIM^v2 and thus some further improvements should be made to resist the proposed attack. 展开更多
关键词 CRYPTOGRAPHY CRYPTANALYSIS side channel attacks (SCA) CPA DECIM^v2
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部