【24h】

Differential Fault Analysis of Twofish

机译:fish鱼的微分故障分析

获取原文

摘要

In this paper we propose Differential Fault Analysis (DFA) of Twofish which was one of the five AES finalists. It uses the concept of key-dependent S-boxes and Pseudo-Hadamard Transform, which make the cipher secure against differential attack. Each S-box is dependent on key because of which the S-box is not known to the attacker. Therefore, the existing DFA techniques which use the differential properties of S-box are not directly applicable to Twofish. We propose DFA based on an approximation technique. The attack retrieves the secret key using around 320 pairs of fault-free and faulty ciphertexts with attack time complexity of 2~(40). To the best of author's knowledge this is the first time a DFA attack is proposed on a cipher like Twofish which uses key-dependent S-box.
机译:在本文中,我们提出了Twofish的差分故障分析(DFA),这是五个AES决赛入围者之一。它使用依赖于密钥的S盒和伪Hadamard变换的概念,从而使密码可以安全地抵御差分攻击。每个S-box都依赖于密钥,因此攻击者不知道S-box。因此,使用S-box的差分属性的现有DFA技术不能直接应用于Twofish。我们提出了一种基于近似技术的DFA。攻击使用大约320对无错和错误的密文检索密钥,攻击时间复杂度为2〜(40)。据作者所知,这是首次针对像Twofish这样的使用密钥相关的S-box的密码提出DFA攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号