首页 | 官方网站   微博 | 高级检索  
     

对MIBS分组密码的差分故障攻击
引用本文:王永娟,张诗怡,王涛,高杨.对MIBS分组密码的差分故障攻击[J].电子科技大学学报(自然科学版),2018,47(4):601-605.
作者姓名:王永娟  张诗怡  王涛  高杨
作者单位:信息工程大学网络空间安全学院 郑州 450000
基金项目:国家博士后基金面上资助2014M552603国家自然科学基金61502524
摘    要:MIBS分组密码是一个基于Feistel结构的轻量级分组密码,适用于RFID、无线传感器等资源受限的硬件环境。差分故障攻击是针对硬件密码算法较为有效的旁路分析手段,通过插入故障和故障传播中涉及的相关密钥之间的关系进行密钥恢复。该文利用S盒的差分不均匀性,通过建立明文差分、密文差分和候选输入值之间的关系,在MIBS密码的最后一轮注入两次故障,可以快速恢复最后一轮密钥信息,进而恢复全部密钥。该攻击思想具有一般性,对基于Feistel结构的轻量级分组密码算法普遍适用。

关 键 词:差分故障攻击    Feistel结构    MIBS算法    旁路攻击
收稿时间:2017-04-06

Differential Fault Attack on Block Cipher MIBS
Affiliation:Cyber Space Security Academy, Information Engineering University Zhengzhou 450000
Abstract:MIBS is a lightweight block cipher based on Feistel structure, suitable for RFID, wireless sensors and other resource-constrained hardware environment. Differential fault attack is a kind of side channel analysis method which is effective for hardware cipher algorithms. The key recovery is carried out by the relationship of the related-key involved both in the inserting fault and the fault propagation. By using the difference nonuniformity of S-box, through the establishment of the relationship among plaintext difference, ciphertext difference and candidate input value, injecting two faults in the last round of MIBS, the last round key can be quickly recovered, and then all the keys. The idea of the attack is general, and it is generally applicable for the lightweight ciphers based on Feistel structure.
Keywords:
点击此处可从《电子科技大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《电子科技大学学报(自然科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号