首页> 外文会议>IEEE International Conference on ASIC >Improving DFA on AES using all-fault ciphertexts
【24h】

Improving DFA on AES using all-fault ciphertexts

机译:使用全故障密文改进AES上的DFA

获取原文

摘要

The traditional random multi-byte fault model in AES fault attack only uses the faulty ciphertexts with diagonal-fault distributions to implement differential fault analysis. When there are not enough exploitable faulty ciphertexts, the round key could not be confirmed directly, and a comparatively large search space is still left for brute-force attack. In this paper, an improved differential fault analysis (DFA) using all-fault ciphertexts on AES was proposed. The all-fault ciphertexts could be used to optimize the selection of the brute-force space, which is helpful to recover the secret key quickly and improves the analysis efficiency. The experiment result demonstrated that by applying the DFA with all-fault ciphertexts, the time consumed on the brute-force attack can be reduced 60.81% on average, which significantly accelerated the process of cracking AES.
机译:AES故障攻击中传统的随机多字节故障模型仅使用具有对角线故障分布的故障密文来进行差分故障分析。当没有足够的可利用的有缺陷的密文时,无法直接确认该轮密钥,并且仍然有较大的搜索空间用于蛮力攻击。本文提出了一种基于AES的全故障密文的改进的差分故障分析(DFA)。全故障密文可用于优化暴力空间的选择,有利于快速恢复密钥,提高分析效率。实验结果表明,通过将DFA与全故障密文结合使用,平均可以将暴力破解所花费的时间减少60.81%,这大大加快了AES破解的速度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号