【24h】

Differential Fault Analysis on PRESENT Key Schedule

机译:PRESENT密钥计划的差异故障分析

获取原文

摘要

PRESENT is a lightweight block cipher designed by A. Bogdanov et al. in 2007 for extremely constrained environments such as RFID tags and sensor networks, where the AES is not suitable for. In this paper, the strength of PRESENT against the differential fault attack on the key schedule is explored. Our attack adopts the nibble oriented model of random faults and assumes that the attacker can induce a single nibble fault on the round key. The attack can efficiently recover the secret key with the computational complexity of $2^{29}$, and sixty-four pairs of correct and faulty cipher texts on average.
机译:PRESENT是由A. Bogdanov等人设计的轻量级分组密码。在2007年适用于RFID标记和传感器网络等极为受限的环境,而AES不适合这种环境。本文研究了关键时刻表上PRESENT抵抗差分故障攻击的强度。我们的攻击采用面向随机故障的半字节定向模型,并假设攻击者可以在轮回密钥上诱发单个半字节故障。攻击可以有效地恢复密钥,其计算复杂度为$ 2 ^ {29} $,平均有64对正确和错误的密文。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号