【24h】

Fault Attacks on Combiners with Memory

机译:带存储器的合路器故障攻击

获取原文
获取原文并翻译 | 示例

摘要

Fault attacks are powerful cryptanalytic tools that are applicable to many types of cryptosystems. Recently, general techniques have been developed which can be used to attack many standard constructions of stream ciphers based on LFSR's. Some more elaborated methods have been invented to attack RC4. These fault attacks are not applicable in general to combiners with memory. In this paper, techniques are developed that specifically allow to attack this class of stream ciphers. These methods are expected to work against any LFSR-based construction that uses only a small memory and few input bits in its output function. In particular, efficient attacks are described against the stream cipher E0 used in Bluetooth, either by inducing faults in the memory or in one of its LFSR's. In both cases, the outputs derived from the faulty runs finally allow to describe the secret key by a system of linear equations. Computer simulations showed that inducing 12 faults sufficed in most cases if about 2500 output bits were available. Another specific fault attack is developed against the stream cipher SNOW 2.0, whose output function has a 64-bit memory. Similar to E_0, the secret key is finally the solution of a system of linear equations. We expect that one fault is enough if about 2~(12) output words are known.
机译:故障攻击是功能强大的密码分析工具,适用于多种类型的密码系统。近来,已经开发了可用于攻击基于LFSR的流密码的许多标准构造的通用技术。已经发明了一些更详细的方法来攻击RC4。这些故障攻击通常不适用于具有内存的组合器。在本文中,开发了专门允许攻击此类流密码的技术。预期这些方法可与任何基于LFSR的构造一起使用,该构造仅在其输出功能中仅使用较小的存储器和很少的输入位。特别是,通过在内存中或其LFSR之一中引发故障来描述针对蓝牙中使用的流密码E0的有效攻击。在这两种情况下,从故障运行中得出的输出最终都可以通过线性方程组来描述密钥。计算机仿真表明,如果大约有2500个输出位可用,则在大多数情况下诱发12个故障就足够了。针对流密码SNOW 2.0开发了另一种特定的故障攻击,该密码的输出功能具有64位内存。类似于E_0,密钥最终是线性方程组的解。如果知道大约2〜(12)个输出字,我们期望一个故障就足够了。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号