共查询到20条相似文献,搜索用时 62 毫秒
1.
对轻量级分组密码算法的故障攻击技术进行了概述和分类,并在此基础上论述了故障攻击技术的研究现状。一方面,论述了针对不同密码算法展开差分故障攻击分析的特点并进行了比较;另一方面,论述了LED,MIBS和Piccolo等轻量级分组密码算法的代数故障攻击分析方法,并进行了比较。最后,对故障攻击分析方法进行了总结与展望。 相似文献
2.
对LILI-128算法对差分故障攻击的安全性进行了研究。攻击采用面向比特的故障模型, 并结合差分分析和代数分析技术, 在 LILI-128 算法LFSRd中注入随机的单比特故障, 得到关于LILI-128算法内部状态的代数方程组, 并使用Crypto MiniSAT解析器求解恢复128位初始密钥。实验结果表明, 280个单比特故障注入就可以在1 min内完全恢复LILI-128全部128位密钥。因此, LILI-128密码实现安全性易遭差分故障攻击威胁, 需要对加密设备进行故障攻击防御, 以提高LILI-128密码实现安全性。 相似文献
3.
LiCi轻量级分组密码算法是2017年提出的一种新型密码算法,其具有结构微小、消耗能量少等优点,适用于物联网等资源受限的环境.在LiCi的设计文档中,对该算法抵御差分攻击和线性攻击的能力进行了分析,但LiCi算法对于差分故障攻击的抵抗能力尚未得到讨论.针对LiCi算法每轮迭代的移位规律,在第31轮迭代时的左半侧多次注入... 相似文献
4.
5.
6.
7.
SMS4密码算法的差分故障攻击 总被引:32,自引:1,他引:31
SMS4是用于WAPI的分组密码算法,是国内官方公布的第一个商用密码算法.由于公布时间不长,关于它的安全性研究尚没有公开结果发表.该文研究SMS4密码算法对差分故障攻击的安全性.攻击采用面向字节的随机故障模型,并且结合了差分分析技术.该攻击方法理论上仅需要32个错误密文就可以完全恢复出SMS4的128比特种子密钥.因为实际中故障发生的字节位置是不可能完全平均的,所以实际攻击所需错误密文数将略大于理论值;文中的实验结果也验证了这一事实,恢复SMS4的128bit种子密钥平均大约需要47个错误密文.文章结果显示SMS4对差分故障攻击是脆弱的.为了避免这类攻击,建议用户对加密设备进行保护,阻止攻击者对其进行故障诱导. 相似文献
8.
研究了AES分组密码对差分故障攻击的安全性,攻击采用面向字节的随机故障模型,结合差分分析技术,通过在AES第8轮列混淆操作前导入随机单字节故障,一次故障导入可将AES密钥搜索空间由2128降低到232.3,在93.6%的概率下,两次故障导入无需暴力破解可直接恢复128位AES密钥.数学分析和实验结果表明:分组密码差分S盒取值的不完全覆盖性为差分故障分析提供了可能性,而AES密码列混淆操作良好的扩散特性极大的提高了密钥恢复效率,另外,本文提出的故障分析模型可适用于其它使用S盒的分组密码算法. 相似文献
9.
许向阳 《小型微型计算机系统》2010,31(9)
AC分组密码是2002年提出的一个征求公众测试的密码算法.文中采用面向比特的随机故障模型,结合差分分析技术,利用置换层对故障的扩散特性和S盒的差分分布性质,对AC算法进行了深入分析.并在普通PC机上进行了2000次模拟试验.实验结果表明:平均需要诱导195个错误就可以恢复AC密码的128比特密钥信息.结论是该算法对差分故障攻击不具有免疫力. 相似文献
10.
11.
电脑操作中80%以上的问题是软件引起的,计算机故障尽管五花八门、千奇百怪,但由于计算机是由一种逻辑部件构成的电子装置,所以软件故障诊断的基本原则,软件故障诊断的方法,计算机软件故障的检修流程,计算机软件故障快速修复的常用方法是有规律可循,可以梳理总结出来。掌握这些规律,计算机软件故障修复可快速解决。 相似文献
12.
13.
14.
15.
网络故障极为繁杂,也相当普遍。如果把网络故障的常见故障进行归类查找,那么无疑能够迅速而准确地查找故障根源,解决网络故障。文章论述了常见网络故障的分析及排除。 相似文献
16.
17.
An important aspect of network management is fault management, which involves, detecting, locating, isolating, correcting and adapting to faults in the network. We study modeling of communication network protocol and fault detection, identification and localization in the discrete event system diagnosis framework. As an illustration of the approach, normal and faulty behavior of the X.25 network protocol is modeled as a finite state machine. This modeling formalism allows the utilization of discrete event system analysis for the detection and diagnosis of faults. Our approach provides a systematic way of performing fault diagnosis for network fault management. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
18.
19.
20.
A Survey of Fault Management in Wireless Sensor Networks 总被引:4,自引:0,他引:4
Wireless sensor networks are resource-constrained self-organizing systems that are often deployed in inaccessible and inhospitable
environments in order to collect data about some outside world phenomenon. For most sensor network applications, point-to-point
reliability is not the main objective; instead, reliable event-of-interest delivery to the server needs to be guaranteed (possibly
with a certain probability). The nature of communication in sensor networks is unpredictable and failure-prone, even more
so than in regular wireless ad hoc networks. Therefore, it is essential to provide fault tolerant techniques for distributed
sensor applications. Many recent studies in this area take drastically different approaches to addressing the fault tolerance
issue in routing, transport and/or application layers. In this paper, we summarize and compare existing fault tolerant techniques
to support sensor applications. We also discuss several interesting open research directions.
Lilia Paradis is currently a graduate student in the Department of Mathematical and Computer Sciences, Colorado School of Mines. She is
also part of the Toilers Ad Hoc Networking research group. She is interested in distributed communication protocols for wireless
sensor networks.
Qi Han received the PhD degree in computer science from the University of California, Irvine in 2005. She is currently an assistant
professor in the Department of Mathematical and Computer Sciences, Colorado School of Mines. Her research interests include
distributed systems, middleware, mobile and pervasive computing, systems support for sensor applications, and dynamic data
management. She is specifically interested in developing adaptive middleware techniques for next generation distributed systems.
She is a member of the IEEE and the ACM. 相似文献