期刊文献+

对轻量级分组密码算法LBlock的差分故障攻击 被引量:3

Differential Fault Attack on Lightweight Block Cipher LBlock
下载PDF
导出
摘要 本文首先分析差分故障攻击的故障模型与原理,利用S盒的差分不均匀性,通过建立输入差分、输出差分和可能输入值之间的对应关系,给出差分故障分析的优化方案,实现快速归约,提高差分故障攻击的效率.本文通过对LBlock算法建立对应关系,可以快速直观缩小输入值取值空间,进而快速确定对应扩展密钥.对于不同故障值(输入差分),对应的输出差分和可能输入值均不相同,可以得到二元关系集合.由于轻量级分组密码S盒多为4×4 S盒,该集合中元素较少,注入少量不同故障值,通过查表,对可能输入值取交集即可快速确定唯一可能输入值.将优化方案应用于LBlock轻量级分组密码算法,在最后一轮输入处注入2次宽度为16 bit的故障可恢复最后一轮轮密钥,然后将状态回推一轮,在倒数第二轮输入处注入2次宽度为16 bit的故障可恢复倒数第二轮密钥.根据密钥扩展方案,恢复两轮轮密钥后将恢复主密钥的计算复杂度降为2^(19). Firstly, this paper analyzes the fault model and principle of differential fault attack. By using the differential inhomogeneity of S-boxes, this paper gives an optimization of differential fault analysis by establishing the corresponding relationship between input differentials, output differentials,and possible input values to improve the efficiency of differential fault attack. In this paper, the corresponding relationship for LBlock algorithm is established, which can be used to effectively reduce the value space of input values, and then quickly determine the corresponding extended key. For different fault values(input differentials), the corresponding output differences, and possible input values are not the same, there exists a set of binary relationships. Since the lightweight S-boxes are mostly 4 × 4 S boxes, there are fewer elements in the set and a small number of different false values are injected. By looking up the table, the only possible input value can be quickly identified by taking the intersection of possible input values. The optimization scheme is applied to the LBlock lightweight block cipher algorithm. In the last round of input, two 16-bit wide faults are recoverable to the last round key, and then the state is pushed one round back. In the second last round, by injecting 2 faults in 16-bit width, the second last round key can be recovered. According to the key expansion scheme,the recovery of two-round key reduces the computational complexity of recovering master key to 219.
作者 王涛 王永娟 高杨 张诗怡 WANG Tao;WANG Yong-Juan;GAO Yang;ZHANG Shi-Yi(Information Engineering University,Zhengzhou 450001,China)
机构地区 信息工程大学
出处 《密码学报》 CSCD 2019年第1期18-26,共9页 Journal of Cryptologic Research
基金 国家自然科学基金(61872381)~~
关键词 轻量级分组密码 LBlock算法 差分故障攻击 lightweight block cipher LBlock algorithm differential fault attack
  • 相关文献

参考文献2

二级参考文献34

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2M. Jurian, I. Lita and D. Visan, "Efficient mobile communi- cation solutions for remote data acquisition, supervisory and control systems", WSEAS Transactions on Communications, Vol.7, No.7, pp.739-748, 2008. 被引量:1
  • 3T.J. Pan, L.N. Zheng, H.J. Zhang, et al., "Research of utility prepayment system based on wireless communication", WSEAS Transactions on Communications, Vol.8, No.l, pp.71-80, 2009. 被引量:1
  • 4E.Bresson, O. Chevassut, D. Pointcheval, et al., "Provably au- thenticated group Diffie-Hellman key exchange", Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia- Pennsylvania, USA, ACM, pp.255-264, 2001. 被引量:1
  • 5E. Bresson, O. Chevassut and D. Pointcheval, "Provably au- thenticated group Diffie-Hellman key exchange-the dynamic case", Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Secu- rity, Gold Coast, Australia, Springer, LNCS Vol.2248, pp.290- 309, 2001. 被引量:1
  • 6E. Bresson, O. Chevassut and D. Pointcheval, "Dynamic group Diffie-Hellman key exchange under standard assumptions", Pro- ceedings of Eurocrypt PO02: International Conference on theTheory and Applications of Cryptographic Techniques, Amster- dam, The Netherlands, Springer, LNCS Vol.2332, pp.321-336, 2002. 被引量:1
  • 7Y. Kim, A. Perrig and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups", Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, ACM, pp.235-244, 2000. 被引量:1
  • 8R. Dutta and R. Barua, "Dynamic group key agreement in tree- based setting", Proceedings of the lOth Australasian Confer- ence on Information Security and Privacy, Brisbane, Australia, Springer, LNCS Vol.3574, pp.101-112, 2005. 被引量:1
  • 9K.Y. Choi, J.Y. Hwang and D.H. Lee, "Efficient ID-based group key agreement with bilinear maps", Proceedings of the 7th In- ternational Workshop on Theory and Practice in Public Key Cryptography, Singapore, Springer, LNCS Vol.2947, pp.130- 144, 2004. 被引量:1
  • 10R. Dutta and R. Barua, "Provably secure constant round con- tributory group key agreement in dynamic setting", IEEE Tran- sancations on Information Theory, Vol.54, No.5, pp.2007-2025, 2008. 被引量:1

共引文献10

同被引文献16

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部