首页 | 本学科首页   官方微博 | 高级检索  
     

轻量级分组密码PUFFIN的差分故障攻击
引用本文:袁庆军,张勋成,高杨,王永娟.轻量级分组密码PUFFIN的差分故障攻击[J].电子与信息学报,2020,42(6):1519-1525.
作者姓名:袁庆军  张勋成  高杨  王永娟
作者单位:1.战略支援部队信息工程大学 郑州 4500012.河南省网络密码技术重点实验室 郑州 450001
基金项目:国家自然科学基金(61602512),河南省网络密码技术重点实验室开放基金(LNCT2019-S02)
摘    要:基于代换–置换网络结构的轻量级分组密码算法PUFFIN在资源受限的硬件环境中使用较广泛,差分故障攻击是针对硬件密码算法较为有效的攻击手段。该文针对PUFFIN算法,改进多比特故障模型,通过构建输出差分和可能输入值之间的关系,注入5次故障即可确定单个S盒唯一输入值;在最后一轮加密过程中注入10次故障,成功恢复轮密钥的概率为78.64%,进而可恢复初始密钥。

关 键 词:差分故障攻击    代换–置换网络结构    PUFFIN算法
收稿时间:2019-07-05

Differential Fault Attack on the Lightweight Block Cipher PUFFIN
Qingjun YUAN,Xuncheng ZHANG,Yang GAO,Yongjuan WANG.Differential Fault Attack on the Lightweight Block Cipher PUFFIN[J].Journal of Electronics & Information Technology,2020,42(6):1519-1525.
Authors:Qingjun YUAN  Xuncheng ZHANG  Yang GAO  Yongjuan WANG
Affiliation:1.PLA Strategic Support Force Information Engineering University, Zhengzhou 450001, China2.Henan Key Laboratory of Network Cryptography Technology, Zhengzhou 450001, China
Abstract:The lightweight block cipher algorithm PUFFIN based on substitution-permutation network structure is widely used in resource-constrained hardware environments. Differential fault attack is a more effective attack method for hardware cryptographic algorithms. The multi-bit fault model for PUFFIN algorithm is improved. By constructing the relationship between the output difference and the possible input values, the single input value of a single S-box can be determined by injecting 5 faults. The probability of successfully recovering the round key is 78.64%, and the initial key can be recovered.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号