首页> 中文期刊> 《计算机工程与应用》 >基于硬件木马的AES差分故障分析

基于硬件木马的AES差分故障分析

         

摘要

针对一般差分故障分析注入的故障不确定、可控性差等特点,提出一种新的规模小、触发率低的木马设计,利用线性反馈移位寄存器生成的最大周期序列作为激活条件,以单个异或门实施可控的故障注入,并提出相应的差分故障分析方法.以FPGA芯片上实现的AES加密电路为目标,植入木马并在第八轮行移位后的中间状态的第一位注入故障,进行差分故障攻击,实验结果表明,仅需两组正确密文与错误密文即可恢复AES的全部密钥,耗时仅5 s.%Aiming at the characteristics of uncertainty and poor controllability in general differential fault analysis fault injection, a new small-scale and low trigger Trojan design is proposed. Using the maximum period sequence generated by a linear feedback shift register as an activation conditions and implementing controllable fault injection by individual XOR door, the corresponding differential fault analysis is proposed. The Trojan is implanted in the AES encryption circuit which is implanted in the FPGA chip, the fault is injected in the first line of intermediate state behind the eighth round shiftrows, and the differential fault attack is run. Experimental results show that, all the key of AES can be restored only by two right ciphertexts and wrong ciphertexts, and it takes only 5 s.

著录项

相似文献

  • 中文文献
  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号