首页> 外文期刊>Information Forensics and Security, IEEE Transactions on >Information-Theoretic Approach to Optimal Differential Fault Analysis
【24h】

Information-Theoretic Approach to Optimal Differential Fault Analysis

机译:信息理论方法用于最优微分故障分析

获取原文
获取原文并翻译 | 示例
           

摘要

This paper presents a comprehensive analysis of differential fault analysis (DFA) attacks on the Advanced Encryption Standard (AES) from an information-theoretic perspective. Injecting faults into cryptosystems is categorized as an active attack where attackers induce an error in operations to retrieve the secret internal information, e.g., the secret key of ciphers. Here, we consider DFA attacks as equivalent to a special kind of passive attack where attackers can obtain leaked information without measurement noise. The DFA attacks are regarded as a conversion process from the leaked information to the secret key. Each fault model defines an upper bound for the amount of leaked information. The optimal DFA attacks should be able to exploit fully the leaked information in order to retrieve the secret key with a practical level of complexity. This paper discusses a new DFA methodology to achieve the optimal DFA attack by deriving the amount of the leaked information for various fault models from an information-theoretic perspective. We review several previous DFA attacks on AES variants to check the optimality of their attacks. We also propose improved DFA attacks on AES-192 and AES-256 that reach the theoretical limits.
机译:本文从信息论的角度对高级加密标准(AES)的差分故障分析(DFA)攻击进行了全面分析。将故障注入密码系统可归为主动攻击,攻击者在操作中导致错误以检索秘密内部信息(例如密码的秘密密钥)。在这里,我们认为DFA攻击等同于一种特殊的被动攻击,在这种被动攻击中,攻击者可以获取泄漏的信息而不会产生测量噪声。 DFA攻击被视为从泄漏信息到密钥的转换过程。每个故障模型都定义了泄漏信息量的上限。最佳DFA攻击应该能够充分利用泄漏的信息,以便以实用的复杂度来检索密钥。本文讨论了一种新的DFA方法,该方法通过从信息理论的角度推导各种故障模型的泄漏信息量来实现最佳DFA攻击。我们回顾了先前针对AES变体的几种DFA攻击,以检查其攻击的最佳性。我们还建议对AES-192和AES-256进行改进的DFA攻击,使其达到理论极限。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号