【24h】

Differential Fault Analysis on SHACAL-1

机译:SHACAL-1的微分故障分析

获取原文
获取外文期刊封面目录资料

摘要

SHACAL-1, known as one of the finalists of the NESSIE project, originates from the compression component of the widely used hash function SHA-1. The requirements of confusion and diffusion are implemented through mixing operations and rotations other than substitution and permutation, thus there exists little literature on its immunity against fault attacks. In this paper, we apply differential fault analysis on SHACAL-1 in a synthetic approach. We introduce the random word fault model, present some theoretical arguments, and give an efficient fault attack based on the characteristic of the cipher. Both theoretical predications and experimental results demonstrate that, 72 random faults are needed to obtain 512 bits key with successful probability more than 60%, while 120 random faults are enough to obtain 512 bits key with successful probability more than 99%.
机译:SHACAL-1,被称为NESSIE项目的决赛选手之一,源于广泛使用的哈希函数SHA-1的压缩组件。混淆和扩散的要求是通过混合操作和旋转(而不是置换和置换)来实现的,因此,关于抗故障攻击的免疫力的文献很少。在本文中,我们采用综合方法对SHACAL-1应用差分故障分析。我们介绍了随机词故障模型,提出了一些理论上的论据,并根据密码的特征给出了有效的故障攻击方法。理论预测和实验结果均表明,获得成功概率超过60%的512位密钥需要72个随机故障,而获得成功概率超过99%的512位密钥则需要120个随机故障。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号