首页 | 本学科首页   官方微博 | 高级检索  
     

针对CLEFIA的多字节差分故障分析
引用本文:高靖哲,赵新杰,矫文成,田军舰.针对CLEFIA的多字节差分故障分析[J].计算机工程,2010,36(19):156-158.
作者姓名:高靖哲  赵新杰  矫文成  田军舰
作者单位:军械工程学院计算机工程系,石家庄,050003
基金项目:国家自然科学基金资助项目,河北省自然科学基金数学研究专项基金资助项目 
摘    要:研究CLEFIA分组密码对多字节差分故障分析的安全性,给出CLEFIA分组密码算法及故障分析原理。根据在第r轮、r-1轮、 r-2轮注入多字节故障的3种条件,提出一种新的针对CLEFIA的多字节故障模型及分析方法。通过仿真实验进行验证,结果表明,由于其Feistel结构和S盒特性,CLEFIA易遭受多字节故障攻击,6~8个错误密文可恢复128 bit的CLEFIA密钥。

关 键 词:分组密码  CLEFIA密码  Feistel结构  多字节故障  差分故障分析

Multiple Bytes Differential Fault Analysis on CLEFIA
GAO Jing-zhe,ZHAO Xin-jie,JIAO Wen-cheng,TIAN Jun-jian.Multiple Bytes Differential Fault Analysis on CLEFIA[J].Computer Engineering,2010,36(19):156-158.
Authors:GAO Jing-zhe  ZHAO Xin-jie  JIAO Wen-cheng  TIAN Jun-jian
Affiliation:(Dept. of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003, China)
Abstract:This paper examines the strength of CLEFIA block cipher against multiple bytes differential fault attack. It presents a principle of CLEFIA and differential fault analysis. According to inject faults into the rth, r-1th, r-2th round three conditions, it proposes a new fault analysis method on CLEFIA based on multiple bytes fault model, and verifies it through software simulation. Experimental result demonstrates that due to its Feistel structure and S-box feature, CLEFIA is vulnerable to multiple bytes fault attack, 6~8 faulty ciphertexts are needed to recover full 128 bit key.
Keywords:block cipher  CLEFIA cipher  Feistel structure  multiple bytes faults  differential fault analysis
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号