针对一般差分故障分析注入的故障不确定、可控性差等特点,提出一种新的规模小、触发率低的木马设计,利用线性反馈移位寄存器生成的最大周期序列作为激活条件,以单个异或门实施可控的故障注入,并提出相应的差分故障分析方法.以FPGA芯片上实现的AES加密电路为目标,植入木马并在第八轮行移位后的中间状态的第一位注入故障,进行差分故障攻击,实验结果表明,仅需两组正确密文与错误密文即可恢复AES的全部密钥,耗时仅5 s.%Aiming at the characteristics of uncertainty and poor controllability in general differential fault analysis fault injection, a new small-scale and low trigger Trojan design is proposed. Using the maximum period sequence generated by a linear feedback shift register as an activation conditions and implementing controllable fault injection by individual XOR door, the corresponding differential fault analysis is proposed. The Trojan is implanted in the AES encryption circuit which is implanted in the FPGA chip, the fault is injected in the first line of intermediate state behind the eighth round shiftrows, and the differential fault attack is run. Experimental results show that, all the key of AES can be restored only by two right ciphertexts and wrong ciphertexts, and it takes only 5 s.
展开▼