首页 | 本学科首页   官方微博 | 高级检索  
   检索      

针对S盒的ARIA-128差分故障分析
引用本文:吴杨,赵新杰,矫文成,吴克辉.针对S盒的ARIA-128差分故障分析[J].军械工程学院学报,2011(3):52-55.
作者姓名:吴杨  赵新杰  矫文成  吴克辉
作者单位:军械工程学院计算机工程系,河北石家庄050003
摘    要:针对ARIA-128分组密码进行差分故障分析,并将差分故障分析简化为求解S盒输入与输出差分问题,同时进行仿真实验。实验结果表明:ARIA-128分组密码易遭受差分故障分析攻击,8次故障注入可恢复1轮扩展轮密钥,32次故障注入即可恢复主密钥。该方法也适用于其他SPN结构的分组密码算法。

关 键 词:ARIA-128  分组密码  S盒  差分故障分析

Differential Fault Analysis on ARIA-128 with S-box
WU Yang,ZHAO Xin-jie,JIAO Wen-cheng,WU Ke-hui.Differential Fault Analysis on ARIA-128 with S-box[J].Journal of Ordnance Engineering College,2011(3):52-55.
Authors:WU Yang  ZHAO Xin-jie  JIAO Wen-cheng  WU Ke-hui
Institution:(Department of Computer Engineering,Ordnance Engineering College,Shijiazhuang 050003,China)
Abstract:This paper presents a differential fault analysis on ARIA-128,simplifies the differential fault analysis process to getting the input and output difference of S-box,and presents the simulating experiment.Experimental results show that:the block cipher ARIA-128 is vulnerable to differential fault analysis attack,8 faulty injections can recover a round key,32 faulty injections can recover the main 128-bit key.On the other hand,the differential fault analysis method in this paper can also be used on other block ciphers with SPN structure.
Keywords:ARIA-128  block cipher  S-box  differential fault analysis
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号