首页 | 本学科首页   官方微博 | 高级检索  
     

LiCi密码的差分故障攻击
引用本文:陈伟建,罗皓翔. LiCi密码的差分故障攻击[J]. 网络与信息安全学报, 2021, 7(2): 104-109. DOI: 10.11959/j.issn.2096-109x.2021033
作者姓名:陈伟建  罗皓翔
作者单位:1. 电子科技大学信息与通信工程学院,四川 成都 611731;2. 电子科技大学格拉斯哥学院,四川 成都 611731
基金项目:电子科技大学创新创业院长基金(2019007)。
摘    要:LiCi轻量级分组密码算法是2017年提出的一种新型密码算法,其具有结构微小、消耗能量少等优点,适用于物联网等资源受限的环境.在LiCi的设计文档中,对该算法抵御差分攻击和线性攻击的能力进行了分析,但LiCi算法对于差分故障攻击的抵抗能力尚未得到讨论.针对LiCi算法每轮迭代的移位规律,在第31轮迭代时的左半侧多次注入...

关 键 词:LiCi密码  轻量级分组密码  差分故障攻击  故障模型

Differential fault attack on LiCi cipher
CHEN Weijian,LUO Haoxiang. Differential fault attack on LiCi cipher[J]. Chinese Journal of Network and Information Security, 2021, 7(2): 104-109. DOI: 10.11959/j.issn.2096-109x.2021033
Authors:CHEN Weijian  LUO Haoxiang
Affiliation:1. School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China;2. Glasgow College, University of Electronic Science and Technology of China, Chengdu 611731, China
Abstract:LiCi lightweight block cipher is a new algorithm proposed in 2017.With advantages of small structure and low energy consumption,LiCi is more suitable for resource-constrained environments such as the internet of things(IoT).In the design document of LiCi,the ability of LiCi algorithm to resist differential attack and linear attack is analyzed,but the resistance of LiCi algorithm to differential fault attack has not been discussed.According to the permutation law of each round iteration of LiCi algorithm,32-bit key can be recovered by injecting a single bit fault into the left half of the 31st round iteration combined with its differential property.According to the key choreography scheme of the LiCi algorithm,the same differential fault attack was performed on iterations 30th,29th,28th,27th and 26th round to recover all the original keys.The attack requires a total of 48-bit faults,and the computational complexity is 232,which indicates the LiCi algorithm is difficult to resist differential fault attacks.
Keywords:LiCi cipher  lightweight block cipher  differential fault attack  fault model
本文献已被 维普 等数据库收录!
点击此处可从《网络与信息安全学报》浏览原始摘要信息
点击此处可从《网络与信息安全学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号