首页 | 本学科首页   官方微博 | 高级检索  
     

AES差分故障攻击的建模与分析
引用本文:刘上力,赵劲强,聂勤务.AES差分故障攻击的建模与分析[J].计算机工程,2010,36(1):189-190.
作者姓名:刘上力  赵劲强  聂勤务
作者单位:湖南科技大学网络信息中心,湘潭,411201
基金项目:湖南省教育厅科研基金 
摘    要:研究高级加密标准(AES)密码算法对差分故障攻击的安全性。攻击采用针对密钥扩展算法的单字节随机故障模型,通过对比正确和错误密文的差异恢复种子密钥。该攻击方法理论上仅需104个错误密文和2个末轮子密钥字节的穷举搜索就可完全恢复AES的128比特种子密钥。故障位置的不均匀分布使实际攻击所需错误密文数与理论值略有不同。

关 键 词:高级加密标准  差分故障攻击  故障诱导  故障模型
修稿时间: 

Modeling and Analysis of AES Differential Fault Attack
LIU Shang-Li,ZHAO Jing-qiang,NIE Qin-wu.Modeling and Analysis of AES Differential Fault Attack[J].Computer Engineering,2010,36(1):189-190.
Authors:LIU Shang-Li  ZHAO Jing-qiang  NIE Qin-wu
Affiliation:(Network and Information Center, Hunan University of Science and Technology, Xiangtan 411201)
Abstract:This paper examines the ability of Advanced Encryption Standard(AES) against the differential fault attack. It uses the byte-oriented fault model against AES key schedule, and compares the differences between correct and faulty secret information embedded in a system to retrieve seed key. Theoretically, the 128 bit master key for AES can be obtained by using 104 faulty ciphertexts and retrieving 2 bytes of tenth round keys by exhaustive search. For the fact that the byte position where the fault happens is not equally distributed, there is little differences between the theoretical value and the number of faulty ciphertexts needed in the attack experiment result.
Keywords:Advanced Encryption Standard(AES)  differential fault attack  fault inducing  fault model
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号