首页> 外文会议>International conference on cryptology in India >Differential Fault Attack on SIMON with Very Few Faults
【24h】

Differential Fault Attack on SIMON with Very Few Faults

机译:具有很少故障的SIMON的差分故障攻击

获取原文

摘要

SIMON, a block cipher proposed by NSA (2013), has received a lot of attention from the cryptology community. Several crypt-analytic results have been presented on its reduced-round variants. In this work, we evaluate the cipher against Differential Fault Attack (DFA). Our analysis shows that SIMON32/64, SIMON48/96 and SIMON64/128 can be attacked by injecting as little as 4, 6 and 9 faults respectively. We first describe the process of identifying the fault locations after injecting random faults. This exploits statistical correlations. Then we show how one can recover the complete key using SAT solvers. To the best of our knowledge, our results are much superior in terms of minimal number of faults compared to the existing results. We also show our results are superior in terms of injecting the faults in the earlier rounds compared to the existing works.
机译:美国国家安全局(NSA)于2013年提出了一种分组密码SIMON,受到了密码学界的广泛关注。关于其减少的回合变体,已经提出了一些隐窝分析结果。在这项工作中,我们评估了针对差分故障攻击(DFA)的密码。我们的分析表明,仅注入4、6和9个故障就可以攻击SIMON32 / 64,SIMON48 / 96和SIMON64 / 128。我们首先描述注入随机故障后识别故障位置的过程。这利用了统计相关性。然后,我们展示了如何使用SAT求解器来恢复完整密钥。据我们所知,与现有结果相比,我们的结果在最少的故障数量方面要优越得多。我们还表明,与现有工作相比,在早期轮次注入故障方面,我们的结果更好。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号