【24h】

A Fault-based Attack on AEZ v4.2

机译:对AEZ v4.2的基于故障的攻击

获取原文

摘要

This paper investigates differential fault attacks against AEZ v4.2 authenticated encryption scheme. AEZ uses three different 128-bit keys (I, J, L) and can potentially work without a nonce or with a repeated nonce. Under these conditions, this paper identifies the best place to apply differential fault attacks. We exploit the structure of AEZ to minimise the total number of faults required for key recovery. We propose an approach that can reduce the number of fault injections required to retrieve all three AEZ keys, I, J and L, from six to four such that these keys are uniquely determined. As a second step, we further reduce the fault injections to three without reducing the success rate of the key recovery attack. This improvement to differential fault attacks on AEZ makes these attacks more practical. The attacks in this paper are verified experimentally using a generic implementation of AEZ v4.2 developed in C.
机译:本文调查了对AEZ V4.2认证加密方案的差异故障攻击。 AEZ使用三个不同的128位键(i,j,l),并且可能在没有nonce或重复的nonce的情况下工作。在这些条件下,本文识别应用差分故障攻击的最佳位置。我们利用AEZ的结构来最小化键恢复所需的故障总数。我们提出了一种方法,可以减少检索所有三个AEZ键,I,J和L的故障注射次数,从六到四个,使得这些键是唯一确定的。作为第二步,我们进一步将故障注射减少到三个,而不会降低关键恢复攻击的成功率。对AEZ对差分故障攻击的这种改进使得这些攻击更加实用。本文的攻击在通过C.中开发的AEZ V4.2的通用实施进行了实验验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号