首页> 外文期刊>Journal of cryptographic engineering >Internal differential fault analysis of parallelizable ciphers in the counter-mode
【24h】

Internal differential fault analysis of parallelizable ciphers in the counter-mode

机译:反模式下并行密码的内部差分故障分析

获取原文
获取原文并翻译 | 示例
           

摘要

In Saha and Chowdhury (Cryptographic hardware and embedded systems-CHES 2016-18th international conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, 2016) the concept of fault analysis using internal differentials within a cipher was introduced and used to overcome the nonce barrier of conventional differential fault analysis with a demonstration on authenticated cipher PAEQ. However, the attack had a limitation with regard to the fault model which restricted one of the faults to be injected in the last byte of the counter. This in turn also required the message size to be fixed at 255 complete blocks. In this work, we overcome these limitations by extending the concept in a more general setting. In particular, we look at the concept of Fault-Quartets which is central to these kind of fault-based attacks. We theorize the relation of the fault model with the message size which forms an important aspect as regards the complexity of internal differential fault analysis (IDFA). Our findings reveal that the fault model undertaken while targeting the counter can be relaxed at the expense of an exponentially larger message size. Interestingly, the algorithm for finding a Fault-Quartet still remains linear. This in turns implies that in case of PAEQ the time complexities of the IDFA attack reported remain unaffected. The internal differential fault attack is able to uniquely retrieve the key of three versions of full-round PAEQ of key sizes 64, 80 and 128 bits with complexities of about 2~(16), 2~(16) and 2~(50), respectively.
机译:在萨哈和Chowdhury(加密硬件和嵌入式系统 - Ches 2016-18国际会议,Santa Barbara,CA,USA,2016年8月,2016年8月17日,2016年8月)介绍了密码内使用内部差异的故障分析的概念用于克服传统差异故障分析的随机屏障,通过经过认证密码PAEQ的演示。然而,该攻击对故障模型有一个限制,该故障模型限制了在计数器的最后一个字节中注入的故障之一。这又需要在255个完整的块中修复消息大小。在这项工作中,我们通过在更常规的环境中扩展概念来克服这些限制。特别是,我们看看故障四重奏的概念,这是基于故障的攻击的核心。我们通过留言大小了解故障模型的关系,这些消息大小形成了内部差分故障分析(IDFA)的复杂性。我们的研究结果表明,在瞄准计数器时进行的故障模型可以以指数较大的信息尺寸为代价放松。有趣的是,用于查找故障四重奏的算法仍然是线性的。这反过来意味着在Paeq的情况下,报告的IDFA攻击的时间复杂性仍未受到影响。内部差分故障攻击能够独特地检索关键尺寸64,80和128位的三个全圆形PAEQ的键,其复杂性约为2〜(16),2〜(16)和2〜(50) , 分别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号