首页> 外文会议>International Conference on Cryptology in India >Differential Fault Attack on SIMON with Very Few Faults
【24h】

Differential Fault Attack on SIMON with Very Few Faults

机译:Simon的差异故障攻击很少有缺陷

获取原文
获取外文期刊封面目录资料

摘要

SIMON, a block cipher proposed by NSA (2013), has received a lot of attention from the cryptology community. Several crypt-analytic results have been presented on its reduced-round variants. In this work, we evaluate the cipher against Differential Fault Attack (DFA). Our analysis shows that SIMON32/64, SIMON48/96 and SIMON64/128 can be attacked by injecting as little as 4, 6 and 9 faults respectively. We first describe the process of identifying the fault locations after injecting random faults. This exploits statistical correlations. Then we show how one can recover the complete key using SAT solvers. To the best of our knowledge, our results are much superior in terms of minimal number of faults compared to the existing results. We also show our results are superior in terms of injecting the faults in the earlier rounds compared to the existing works.
机译:SIMON是NSA(2013)提出的块密码,已经从密码学区接受了很多人。在其倒数圆形变体上呈现了几种隐性分析结果。在这项工作中,我们评估密码对抗差分故障攻击(DFA)。我们的分析表明,Simon32 / 64,Simon48 / 96和Simon64 / 128可以通过分别注入4,6和9个故障来攻击。我们首先描述了注入随机故障后识别故障位置的过程。这利用统计相关性。然后我们展示如何使用SAT求解器恢复完整的密钥。据我们所知,与现有结果相比,我们的结果在最小的故障方面都是如此优越。我们还显示我们的结果在与现有作品相比之前注入了早期轮次的故障。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号