首页 | 本学科首页   官方微博 | 高级检索  
     

线性反馈移位寄存器的差分能量攻击
引用本文:臧玉亮,韩文报.线性反馈移位寄存器的差分能量攻击[J].电子与信息学报,2009,31(10):2406-2410.
作者姓名:臧玉亮  韩文报
作者单位:解放军信息工程大学信息工程学院,郑州,450002
摘    要:能否有效去除算法噪声的影响,直接关系到能量攻击成败。该文以线性反馈移位寄存器(LFSR)相邻两个时钟周期的能量消耗差异为出发点,提出了一种新的差分能量攻击算法。它从根本上去除了密码算法噪声在攻击过程中带来的影响。由于该算法随机选择初始向量(initialization vector),从而使攻击者能够容易地将其推广到具有类似结构的流密码体制。为了进一步验证攻击算法的有效性,该文利用软件仿真的方法对DECIM进行了模拟攻击。仿真结果表明,该攻击算法能够有效降低LFSR的密钥搜索的复杂度。

关 键 词:流密码    差分能量攻击    线性反馈移位寄存器    DECIM    复杂度
收稿时间:2008-10-14
修稿时间:2009-6-25

Differential Power Attack on Liner Feedback Shift Register
Zang Yu-liang Han Wen-bao.Differential Power Attack on Liner Feedback Shift Register[J].Journal of Electronics & Information Technology,2009,31(10):2406-2410.
Authors:Zang Yu-liang Han Wen-bao
Affiliation:Institute of Information Engineering, PLA Information Engineering University, Zhengzhou 450002, China
Abstract:Whether the algorithm noise can be effectively wiped off decides the success or loss of the power analysis attack. This paper offers a new differential power analysis attack algorithm, which is based on the consumed power differences between two neighboring clock cycles of liner feedback shift register. This new attack algorithm radically wipes off the effect of cipher algorithm noise in the process of attack. Because this algorithm randomly chooses initialization vectors, the attackers can easily extend the algorithm to other stream ciphers that have similar structures. In order to further validate the algorithm’s availability, simulative attacks on DECIM are carried on with the method of software simulation. And the result shows that this algorithm can effectively reduce the complexity of the exhaustive search on LFSR.
Keywords:Stream cipher  Differential Power Attack (DPA)  Liner Feedback Shift Register (LFSR)  DECIM  Complexity
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号