-
-
[原创eprint 2010 新发表文章“Multiple Bytes Differential Fault Analysis on CLEFIA”
-
发表于: 2010-2-17 09:10 5130
-
[原创eprint 2010 新发表文章“Multiple Bytes Differential Fault Analysis on CLEFIA”
2010-2-17 09:10
5130
网页链接 88aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3g2H3M7X3W2F1N6q4)9J5k6h3W2S2j5%4u0Q4x3X3g2G2M7X3N6Q4x3V1j5J5x3o6p5H3i4K6u0r3x3o6M7^5
PDF链接 d1aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3g2H3M7X3W2F1N6q4)9J5k6h3W2S2j5%4u0Q4x3X3g2G2M7X3N6Q4x3V1j5J5x3o6p5H3i4K6u0r3x3o6M7^5i4K6u0W2M7r3c8X3
祝大家新年快乐,欢迎大家指教!
Cryptology ePrint Archive: Report 2010/078
Multiple Bytes Differential Fault Analysis on CLEFIA
Xin-jie ZHAO and Tao WANG and Jing-zhe GAO
Abstract: This paper examines the strength of CLEFIA against multiple bytes differential fault attack. Firstly, it presents the principle of CLEFIA algorithm and differential fault analysis; then, according to injecting faults into the rth,r-1th,r-2th CLEFIA round three conditions, proposes three fault models and corresponding analysis methods; finally, all of the fault model and analysis methods above have been verified through software simulation. Experiment results demonstrate that: CLEFIA is vulnerable to differential fault attack due to its Feistel structure and S-box feature, 5-6,6-8,2 faults are needed to recover CLEFIA-128 based on the three fault models in this paper respectively, multiple byte faults model can greatly improve the attack practicality and even the attack efficiency, and the fault analysis methods in this paper can provide some fault analysis ideas on other block ciphers using S-box.
Category / Keywords: Multiple byte faults;Differential fault analysis;CLEFIA; Feistel Structure;Block cipher
Date: received 11 Feb 2010, last revised 11 Feb 2010
PDF链接 d1aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3g2H3M7X3W2F1N6q4)9J5k6h3W2S2j5%4u0Q4x3X3g2G2M7X3N6Q4x3V1j5J5x3o6p5H3i4K6u0r3x3o6M7^5i4K6u0W2M7r3c8X3
祝大家新年快乐,欢迎大家指教!
Cryptology ePrint Archive: Report 2010/078
Multiple Bytes Differential Fault Analysis on CLEFIA
Xin-jie ZHAO and Tao WANG and Jing-zhe GAO
Abstract: This paper examines the strength of CLEFIA against multiple bytes differential fault attack. Firstly, it presents the principle of CLEFIA algorithm and differential fault analysis; then, according to injecting faults into the rth,r-1th,r-2th CLEFIA round three conditions, proposes three fault models and corresponding analysis methods; finally, all of the fault model and analysis methods above have been verified through software simulation. Experiment results demonstrate that: CLEFIA is vulnerable to differential fault attack due to its Feistel structure and S-box feature, 5-6,6-8,2 faults are needed to recover CLEFIA-128 based on the three fault models in this paper respectively, multiple byte faults model can greatly improve the attack practicality and even the attack efficiency, and the fault analysis methods in this paper can provide some fault analysis ideas on other block ciphers using S-box.
Category / Keywords: Multiple byte faults;Differential fault analysis;CLEFIA; Feistel Structure;Block cipher
Date: received 11 Feb 2010, last revised 11 Feb 2010
赞赏
他的文章
赞赏
雪币:
留言: