###
计算机系统应用英文版:2022,31(10):288-294
本文二维码信息
码上扫一扫!
基于ESF密码算法改进的差分故障攻击
(1.湖南天河国云科技有限公司, 长沙 410100;2.长沙理工大学 计算机与通信工程学院, 长沙 410114)
Improved Differential Fault Attack Based on ESF Cryptographic Algorithm
(1.Hunan Tianheguoyun Technology Co. Ltd., Changsha 410100, China;2.School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha 410114, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 503次   下载 1069
Received:January 19, 2022    Revised:February 15, 2022
中文摘要: 利用置换层结构的特点及差分故障的基本思想, 提出一种针对ESF算法的差分故障攻击方法. 在第30轮多次注入1比特故障, 根据S盒的差分特性, 由不同的输入输出差分对, 得到不同的S盒的输入值集合, 取其交集可快速确定唯一的S盒的可能输入值, 分析得出最后一轮轮密钥. 采用同样的方法, 多次在第29轮、28轮注入1比特故障, 结合最后一轮轮密钥, 同样利用S盒的差分特性分析得出倒数第2轮、第3轮轮密钥. 共需约10个故障密文, 恢复3轮轮密钥后将恢复主密钥的计算复杂度降为222.
Abstract:In light of the structural characteristics of the displacement layer and the basic idea of differential fault, this study proposes a differential fault attack method for the eight-sided fortress (ESF) algorithm. In the 30th round, a 1-bit fault is injected multiple times. Various input and output differential pairs are used to obtain different input sets for the S-box according to the differential characteristics of the S-box. Taking the intersection of the sets is a quick way to determine the only possible inputs for the S-box. The round key of the last round can then be obtained through analysis. Similarly, a 1-bit fault is injected in the 29th and 28th rounds many times. With the round key of the last round, the differential characteristics of the S-box are leveraged again to obtain the round keys of the last but one and last but two rounds. About 10 fault ciphertexts are required. After the round keys of three rounds are recovered, the computational complexity of recovering the master key is reduced to 222.
文章编号:     中图分类号:    文献标志码:
基金项目:湖南省十大技术攻关项目
引用文本:
孔曼,谭林,王云丽,龙敏.基于ESF密码算法改进的差分故障攻击.计算机系统应用,2022,31(10):288-294
KONG Man,TAN Lin,WANG Yun-Li,LONG Min.Improved Differential Fault Attack Based on ESF Cryptographic Algorithm.COMPUTER SYSTEMS APPLICATIONS,2022,31(10):288-294