首页> 外文OA文献 >A differential fault attack technique against SPN structures, with application to the AES and KHAZAD
【2h】

A differential fault attack technique against SPN structures, with application to the AES and KHAZAD

机译:针对SPN结构的差分故障攻击技术,应用于AES和KHAZAD

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

In this paper we describe a differential fault attack technique working against Substitution-Permutation Networks, and requiring very few faulty ciphertexts. The fault model used is realistic, as we consider random faults affecting bytes (faults affecting one only bit are much harder to induce). We implemented our attack on a PC for both the AES and KHAZAD. We are able to break the AES-128 with only 2 faulty ciphertexts, assuming the fault occurs between the antepenultimate and the penultimate MixColumn; this is better than the previous fault attacks against AES[6,10,11]. Under similar hypothesis, KHAZAD is breakable with 3 faulty ciphertexts.
机译:在本文中,我们描述了一种针对替代置换网络的差分故障攻击技术,该技术几乎不需要错误的密文。使用的故障模型是现实的,因为我们认为随机故障会影响字节(仅影响一个位的故障就很难诱发)。我们针对AES和KHAZAD在PC上实施了攻击。假设故障发生在倒数第二个和倒数第二个MixColumn之间,我们仅用2个错误的密文就能破解AES-128。这比以前针对AES的故障攻击要好[6,10,11]。在类似的假设下,KHAZAD可以用3个错误的密文破解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号