期刊文献+

Piccolo密码代数故障分析研究 被引量:9

Research of Algebraic Fault Analysis on Piccolo
下载PDF
导出
摘要 应用代数故障分析方法,对Piccolo密码抗故障攻击安全性进行了评估.首先利用代数方法建立Piccolo密码等效布尔方程组;然后通过故障攻击手段获取故障密文并将故障注入差分进行表示,给出了一种故障注入位置未知情况下的故障差分布尔方程组表示方法;最后使用CryptoMiniSAT解析器求解联立方程组恢复密钥.结果表明,代数故障分析相比传统差分故障分析具有以下优点:(1)在线故障注入较少,在Piccolo-80第23轮注入4bit故障,1次故障注入即可恢复80位密钥;(2)离线分析方法简单,无需结合算法和故障模型判断故障位置,执行繁琐的故障差分传播分析,自动化程度较高;(3)计算资源利用率高,可将故障攻击下的密钥恢复转化为代数方程求解问题,充分利用计算资源;(4)通用性较好,可扩展到宽度故障模型、深度故障模型、其它版本的Piccolo密码以及多种分组密码,有望成为评估分组密码抗故障攻击能力的通用方法. The security of Piccolo is evaluated under the algebraic fault analysis(AFA).Firstly,Piccolo is described as a set of algebraic equations.The faulty ciphertext is generated via fault injections and then the fault differences are also represented with algebraic equations even when the locations of the fault injections are unknown.Finally,the CryptoMinisat solver is applied to solve for the key.The simulation experiments demonstrate that: compared with the traditional differential fault analysis(DFA),the number of fault injections that required in AFA is smaller,only a single fault injection at the 23-rd round is enough to break Piccolo-80;the procedure of AFA is quite simple,in contrast to DFA,the adversaries do not need to judge the accurate fault locations and carry out the complicated manual analysis on the targeted algorithms and fault models;the utilization ratio of computing resources is high,since the key recovery in fault attacks can be converted into the problem of solving algebraic equations,the adversaries can fully utilize the computing resources;the technique of AFA is generic,the attack can be easily extended to wide fault models,deep fault model,other variants of Piccolo and other block ciphers.This paper shows that AFA is very promising to become a generic methodology to evaluate the security of block ciphers against fault attacks.
出处 《计算机学报》 EI CSCD 北大核心 2013年第4期882-894,共13页 Chinese Journal of Computers
基金 国家自然科学基金项目"分组密码代数旁路攻击技术研究"(61173191) "基于微架构泄露的密码分析技术研究"(61272491)资助
关键词 代数故障分析 故障模型 CryptMinisat Piccolo 轻量级分组密码 algebraic fault analysis fault model CryptMinisat Piccolo lightweight block cipher
  • 相关文献

参考文献34

  • 1Bar-El H, Choukri H, Naccache D,Tunstall M,Whelan C.The sorcerer’s apprentice guide to fault attack. CryptologyePrint Archive, 2004. Available at http://eprint. iacr. org/2004/100. pdf. 被引量:1
  • 2Fukunaga T,Takahashi J. Practical fault attack on a crypto-graphic LSI with ISO/IEC 18033-3 block ciphers//Proceed-ings of the FDTC2009. Lausanne, Switzerland,2009:84-92. 被引量:1
  • 3Boneh D,DeMillo R A, Lipton R J. On the importance ofchecking cryptographic protocols for faults//Proceedings ofthe EUROCRYPT 1997. Konstanz, Germany. LNCS 1233.1997:37-51. 被引量:1
  • 4Biham E,Shamir A. Differential fault analysis of secret keycryptosystem//Proceedings of the CRYPTO 1997. SantaBarbara, California, USA. LNCS 1294. 1997; 513-525. 被引量:1
  • 5Biehl I,Meyer B,Muller V. Differential fault analysis onelliptic curve cryptosystems//Proceedings of the CRYPTO2000.Santa Barbara,California. LNCS 1880. 2000:131-146. 被引量:1
  • 6Mukhopadhyay D. An improved fault based attack of the ad-vanced encryption standard//Proceedings of the AFRI-CACRYPT 2009. Gammarth, Tunisia. LNCS 5580. 2009 :421-434. 被引量:1
  • 7Zhou Y B, Wu W L, Xu N N, Feng D G. Differential faultattack on Camellia. Chinese Journal of Electronics, 2009,18(1):13-19. 被引量:1
  • 8Li W,Gu D W? Li J R et al. Differential fault analysis onCamellia. The Journal of Systems and Software, InformationSciences, 2010, 83(5):844-851. 被引量:1
  • 9赵新杰,王韬,郭世泽.一种针对Camellia的改进差分故障分析[J].计算机学报,2011,34(4):613-627. 被引量:9
  • 10张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67

二级参考文献34

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法.http://www. oscca. gov. cn/UpFile/200621016423197990.pdf. 被引量:3
  • 3Boneh D. , DeMillo R. A. , Lipton R. J.. On the importance of checking cryptographic protocols for faults. In: Proceedings of the EUROCRYPT'97, Konstanz, Germany, 1997, 37-51 被引量:1
  • 4Biham E. , Shamir A.. Differential fault analysis of secret key cryptosystems. In: Proceedings of the CRYPTO' 97, Santa Barbara, California, USA, 1997, 513-525 被引量:1
  • 5Biehl I. , Meyer B. , Muller V.. Differential fault attacks on elliptic curve cryptosystems. In: Proceedings of the CRYPTO 2000, Santa Barbara, California, USA, 2000, 131- 146 被引量:1
  • 6Blomer J. , Seifert Jean Pierre. Fault based cryptanalysis of the advanced encryption standard (AES). In: Wright R. N. ed.Financial Cryptography-FC 2003. Lecture Notes in Computer Science 2742. Berlin: Springer-Verlag, 2003, 162- 181 被引量:1
  • 7Giraud C.. DFA on AES. In: Dobbertin H. , Rljmen V.Sowa A. eds. Advanced Eneryption Standard 4-AES 2004. Lecture Notes in Computer Science 3373. Berlin: Springer Verlag, 2005, 27-41 被引量:1
  • 8Chen Chien-Ning, Yen Sung-Ming. Differential fault analysis on AES key schedule and some countermeasures. In: Proceedings of the Australasian Conference on Information Security and Privacy-ACISP 2003, Wollongong, Australia, 2003, 118- 129 被引量:1
  • 9Dusart P. , Letourneux G. , Vivolo O.. Differential fault analysis on AES. In: Zhou J., Yung M. , Han Y.. eds.. Applied Cryptography and Network Security-ACNS 2003. Lecture Notes in Computer Science 2846. Berlin: Springer-Verlag, 被引量:1
  • 10Heroine L.. A differential fault attack against early rounds of(Triple-) DES. In: Joye Marc, Quisquater Jean-Jacques eds.Cryptographic Hardware and Embedded Systems CHES 2004.Lecture Notes in Computer Science 3156. Berlin: Springer-Verlag, 2004, 254-267 被引量:1

共引文献99

同被引文献31

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2Shibutani K, Isobe T, Hiwatari H. Piccolo : an ultra-lightweight l)look-cipher[ C ]//Proc of International Workshop of Cryptographic Hard-ware and Embedded Systems. 2011 : 326-341. 被引量:1
  • 3Minier M. On the security of piccolo lightweight block cipher againstrelated-Key impossible differentials[ C]//Proc of the 14th Internation-al Conference on Cryptology. 2013 :308-318. 被引量:1
  • 4Jeong K. Security analysis of block cipher piccolo suitable for wirelesssensor networks [ J ]. Peer-to-Peer Networking and Application,2013,7(4) :636-644. 被引量:1
  • 5Jeong K. Cryptanalysis of cipher piccolo suitable for cloud computing[J]. Journal of Supercomputing,2013,66(2) :829-840. 被引量:1
  • 6Wang Yanfeng, Wu Wenling, Yu Xiaoli. Biclique cryptanalysis of re-duced-round piccolo block cipher [ C]//Proc of the 8th InternationalConference on Information Security Practice and Experience. 2012 :337-352. 被引量:1
  • 7Boneh D, DeMillo R A, Lipton R J. On the impor- tance of checking cryptographic protocols for faults [C]//Proceedings of the EUROCRYPT 1997, LNCS 1233. Konstanz : Springer, 2001 : 37-51. 被引量:1
  • 8Biham E, Shamir A. Differential fault analysis of se- cret key cryptosystems [C] // Proceedings of the CRYPTO 1997, LNCS 1294. Santa Barbara : Springer, 1997:513-525. 被引量:1
  • 9Biehl I, Meyer B, Muller V. Differential fault attacks on elliptic curve cryptosystems [C] // Proceedings of the CRYPTO 2000, LNCS 1880. Santa Barbara: Springer, 2000 : 131-146. 被引量:1
  • 10Banik S, Maitra S, Sarkar S. A different fault attack on the grain family of stream ciphers[C]///Proceed- ings of CHES 2010, LNCS 7428. Santa Barbara: Springer, 2012 : 122-139. 被引量:1

引证文献9

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部