高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

SHACAL-2算法的差分故障攻击

魏悦川 李琳 李瑞林 李超

魏悦川, 李琳, 李瑞林, 李超. SHACAL-2算法的差分故障攻击[J]. 电子与信息学报, 2010, 32(2): 318-322. doi: 10.3724/SP.J.1146.2008.01575
引用本文: 魏悦川, 李琳, 李瑞林, 李超. SHACAL-2算法的差分故障攻击[J]. 电子与信息学报, 2010, 32(2): 318-322. doi: 10.3724/SP.J.1146.2008.01575
Wei Yue-chuan, Li Lin, Li Rui-lin, Li Chao. Differential Fault Analysis on SHACAL-2[J]. Journal of Electronics & Information Technology, 2010, 32(2): 318-322. doi: 10.3724/SP.J.1146.2008.01575
Citation: Wei Yue-chuan, Li Lin, Li Rui-lin, Li Chao. Differential Fault Analysis on SHACAL-2[J]. Journal of Electronics & Information Technology, 2010, 32(2): 318-322. doi: 10.3724/SP.J.1146.2008.01575

SHACAL-2算法的差分故障攻击

doi: 10.3724/SP.J.1146.2008.01575

Differential Fault Analysis on SHACAL-2

  • 摘要: 该文采用面向字的随机故障模型,结合差分分析技术,评估了SHACAL-2算法对差分故障攻击的安全性。结果显示:SHACAL-2算法对差分故障攻击是不免疫的。恢复出32 bit子密钥的平均复杂度为8个错误密文,完全恢复出512 bit密钥的复杂度为128个错误密文。
  • Boneh D, DeMillo R A, and Lipton R J. On the importance of checking cryptographic protocols for faults[J].EUROCRYPT97, Konstanz, Germany.1997, LNCS 1233:37-51[2]Biham E and Shamir A. Differential fault analysis of secret key cryptosystems[J].CRYPTO97, California, USA.1997, LNCS 1294:513-525[3]Biehl I, Meyer B, and Mller V. Differential fault attacks on elliptic curve cryptosystems. CRYPTO 2000, California, USA, 2000, LNCS 1880: 131-146.[4]Hemme L. A differential fault attack against early rounds of (Triple-) DES. Cryptographic Hardware and Embedded Systems-CHES 2004. Boston, 2004, LNCS 3156: 254-267.[5]张蕾, 吴文玲. SMS4密码算法的差分故障攻击. 计算机学报, 2006, 29(9): 1596-1602.Zhang Lei and Wu Wen-ling. Differential fault analysis on SMS4. Chinese Journal of Computers, 2006, 29(9): 1596-1602.[6]Li Wei, Gu Da-wu, and Li Juan-ru. Differential fault analysis on the ARIA algorithm[J].Information Sciences.2008, 178(19):3727-3737[7]李玮, 谷大武. 基于密钥编排故障的SMS4算法的差分故障分析. 通信学报, 2008, 29(10): 135-142.Li Wei and Gu Da-wu. Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule. Journal of China Institute of Communications, 2008, 29(10): 135-142.[8]Chen Hua, Wu Wen-ling, and Feng Deng-guo. Differential fault analysis on CLEFIA. International Conference on Information and Communication Security-ICICS 2007, Zhengzhou, China, 2007, LNCS 4861: 284-295.[9]Piret G and Quisquater J J. A differential fault attack technique against SPN Structures, with Application to the AES and KHAZAD. Cryptographic Hardware and Embedded Systems-CHES 2003.Cologne, 2003, LNCS 2779: 77-88.[10]李琳, 李瑞林, 谢端强, 李超. KeeLoq和SHACAL-1算法的差分故障攻击. 武汉大学学报, 2008, 54(5): 507-512.Li Lin, Li Rui-lin, Xie Duan-qiang, and Li Chao. Differential Fault Analysis on Keeloq and SHACAL-1. Journal of Wuhan University, 2008, 54(5): 507-512.[11]NIST. FIPS-180-2: Secure Hash Standard(SHS). 2002.
  • 加载中
计量
  • 文章访问数:  3913
  • HTML全文浏览量:  102
  • PDF下载量:  991
  • 被引次数: 0
出版历程
  • 收稿日期:  2008-11-27
  • 修回日期:  2009-11-04
  • 刊出日期:  2010-02-19

目录

    /

    返回文章
    返回