首页 | 本学科首页   官方微博 | 高级检索  
     

对流密码LILI-128的差分故障攻击
引用本文:陈 浩,王 韬,刘会英.对流密码LILI-128的差分故障攻击[J].计算机应用研究,2013,30(11):3396-3399.
作者姓名:陈 浩  王 韬  刘会英
作者单位:军械工程学院信息工程系, 石家庄 050003
基金项目:国家自然科学基金资助项目(61173191)
摘    要:对LILI-128算法对差分故障攻击的安全性进行了研究。攻击采用面向比特的故障模型, 并结合差分分析和代数分析技术, 在 LILI-128 算法LFSRd中注入随机的单比特故障, 得到关于LILI-128算法内部状态的代数方程组, 并使用Crypto MiniSAT解析器求解恢复128位初始密钥。实验结果表明, 280个单比特故障注入就可以在1 min内完全恢复LILI-128全部128位密钥。因此, LILI-128密码实现安全性易遭差分故障攻击威胁, 需要对加密设备进行故障攻击防御, 以提高LILI-128密码实现安全性。

关 键 词:差分故障攻击  流密码  LILI-128算法  可满足问题  可满足问题求解软件

Differential fault attack on LILI-128
CHEN Hao,WANG Tao,LIU Hui-ying.Differential fault attack on LILI-128[J].Application Research of Computers,2013,30(11):3396-3399.
Authors:CHEN Hao  WANG Tao  LIU Hui-ying
Affiliation:Dept. of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China
Abstract:This paper examined the strength of LILI-128 against differential fault attack. On the basis of the bite-oriented fault model, combining with differential analysis and algebraic analysis, it implanted the attack on the LILI-128 to generate equations for its internal states by inducing faults in LFSRd to recover its 128 bits secret key. Experimental results show that the attack could recover the whole 128 bits secret key by inducing only 280 faults in a minute. The LILI-128 is vulnerable to differential faults attack. To strengthen the security of the LILI-128, it should take measures to protect the encryption device from differential fault attack.
Keywords:differential fault attack  stream cipher  LILI-128 algorithm  SAT  CryptoMiniSAT
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号