轻量级分组密码TWINE的差分故障攻击

为了对轻量级分组密码TWINE的安全性进行研究,分析了轻量级分组密码TWINE的抗差分故障攻击特性,给出了TWINE一种差分故障分析方法,采用面向半字节的随机故障模型对TWINE算法进行攻击。实验结果表明,在35轮注入4次故障后可将密钥空间降低至约220,平均注入13.15次故障后可完全恢复80 bit密钥,最好的情况为注入12次故障完全恢复种子密钥。因此得到结论:TWINE算法易受差分故障攻击,需在使用前对设备加以保护。...

Full description

Saved in:
Bibliographic Details
Published in计算机应用研究 Vol. 32; no. 6; pp. 1796 - 1800
Main Author 徐朋 魏悦川 潘晓中
Format Journal Article
LanguageChinese
Published 中国人民武装警察部队工程大学电子技术系,西安,710086 2015
Subjects
Online AccessGet full text
ISSN1001-3695
DOI10.3969/j.issn.1001-3695.2015.06.043

Cover

Abstract 为了对轻量级分组密码TWINE的安全性进行研究,分析了轻量级分组密码TWINE的抗差分故障攻击特性,给出了TWINE一种差分故障分析方法,采用面向半字节的随机故障模型对TWINE算法进行攻击。实验结果表明,在35轮注入4次故障后可将密钥空间降低至约220,平均注入13.15次故障后可完全恢复80 bit密钥,最好的情况为注入12次故障完全恢复种子密钥。因此得到结论:TWINE算法易受差分故障攻击,需在使用前对设备加以保护。
AbstractList 为了对轻量级分组密码TWINE的安全性进行研究,分析了轻量级分组密码TWINE的抗差分故障攻击特性,给出了TWINE一种差分故障分析方法,采用面向半字节的随机故障模型对TWINE算法进行攻击。实验结果表明,在35轮注入4次故障后可将密钥空间降低至约220,平均注入13.15次故障后可完全恢复80 bit密钥,最好的情况为注入12次故障完全恢复种子密钥。因此得到结论:TWINE算法易受差分故障攻击,需在使用前对设备加以保护。
TP309.2; 为了对轻量级分组密码TWINE的安全性进行研究,分析了轻量级分组密码TWINE的抗差分故障攻击特性,给出了TWINE一种差分故障分析方法,采用面向半字节的随机故障模型对TWINE算法进行攻击.实验结果表明,在35轮注入4次故障后可将密钥空间降低至约220,平均注入13.15次故障后可完全恢复80 bit密钥,最好的情况为注入12次故障完全恢复种子密钥.因此得到结论:TWINE算法易受差分故障攻击,需在使用前对设备加以保护.
Author 徐朋 魏悦川 潘晓中
AuthorAffiliation 中国人民武装警察部队工程大学电子技术系,西安710086
AuthorAffiliation_xml – name: 中国人民武装警察部队工程大学电子技术系,西安,710086
Author_FL Pan Xiaozhong
Xu Peng
Wei Yuechuan
Author_FL_xml – sequence: 1
  fullname: Xu Peng
– sequence: 2
  fullname: Wei Yuechuan
– sequence: 3
  fullname: Pan Xiaozhong
Author_xml – sequence: 1
  fullname: 徐朋 魏悦川 潘晓中
BookMark eNo9jz9Lw0AYxm-oYFv9EuLgkvTN5e5Nb5RStVB0KTiGt2mvJuhVG0QyCrV1c9GlOLi56SgY_Dhp7LfwpOL0wMOP50-NVczYDBnb9cD1FapG4sZpalwPwHN8VNLl4EkX0AXhV1j1399ktTRNAAT3FFRZ4_srX80fys_X4n5W5tPifVa-3PZOO8ftcjEtPt6svXy6Wy2el495Mc-32Iam83S4_ad11jto91pHTvfksNPa7zoRgu9QQEhKSk0cvYEUXAMEeoCcQ8SbSCKgJie0lGhSX2GgpewPSClhJ5LQfp3trWNvyGgyozAZX0-MLQyTNMmyLPl9B2i_WXRnjUZnYzO6ii18OYkvaJKFiAKDQHDl_wCyqWIx
ClassificationCodes TP309.2
ContentType Journal Article
Copyright Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
Copyright_xml – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
DBID 2RA
92L
CQIGP
W92
~WA
2B.
4A8
92I
93N
PSX
TCJ
DOI 10.3969/j.issn.1001-3695.2015.06.043
DatabaseName 维普期刊资源整合服务平台
中文科技期刊数据库-CALIS站点
中文科技期刊数据库-7.0平台
中文科技期刊数据库-工程技术
中文科技期刊数据库- 镜像站点
Wanfang Data Journals - Hong Kong
WANFANG Data Centre
Wanfang Data Journals
万方数据期刊 - 香港版
China Online Journals (COJ)
China Online Journals (COJ)
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
DocumentTitleAlternate Differential fault attack on TWINE
DocumentTitle_FL Differential fault attack on TWINE
EndPage 1800
ExternalDocumentID jsjyyyj201506043
664677429
GrantInformation_xml – fundername: 国家自然科学基金
GroupedDBID -0Y
2B.
2C0
2RA
5XA
5XJ
92H
92I
92L
ACGFS
ALMA_UNASSIGNED_HOLDINGS
CCEZO
CQIGP
CUBFJ
CW9
TCJ
TGT
U1G
U5S
W92
~WA
4A8
93N
ABJNI
PSX
ID FETCH-LOGICAL-c603-a7a6a955fa261d542f007fd6220c286a47a82a67a648ab967f55bda994369a4f3
ISSN 1001-3695
IngestDate Thu May 29 03:54:50 EDT 2025
Wed Feb 14 10:30:37 EST 2024
IsPeerReviewed false
IsScholarly true
Issue 6
Keywords security
轻量级分组密码
random fault model
TWINE
lightweight block cipher
differential fault attack
差分故障攻击
安全性
随机故障模型
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c603-a7a6a955fa261d542f007fd6220c286a47a82a67a648ab967f55bda994369a4f3
Notes lightweight block cipher; security; TWINE; differential fault attack; random fault model
51-1196/TP
This paper analyzed the resistance of TWINE against differential fault attack in order to do research on the security of TWINE. It presented a method of differential fault analysis on TWINE and applied the nibble-based random fault model to attack TWINE. As a result, the key space can be limited to 220 after 4 injections of fault into round 35. The 80 bit primitive key can be determined after 13. 15 injections of fault on average. The best result is that it determines the 80 bit primitive key by in- jecting 12 faults. So TWINE is vulnerable to differential fault attack and advanced protection should be used before applying this kind of device.
Xu Peng, Wei Yuechuan, Pan Xiaozhong ( Dept. of Electronic Technique, Engineering University of Chinese Armed Police Force, Xi' an 710086, China)
PageCount 5
ParticipantIDs wanfang_journals_jsjyyyj201506043
chongqing_primary_664677429
PublicationCentury 2000
PublicationDate 2015
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – year: 2015
  text: 2015
PublicationDecade 2010
PublicationTitle 计算机应用研究
PublicationTitleAlternate Application Research of Computers
PublicationTitle_FL Application Research of Computers
PublicationYear 2015
Publisher 中国人民武装警察部队工程大学电子技术系,西安,710086
Publisher_xml – name: 中国人民武装警察部队工程大学电子技术系,西安,710086
SSID ssj0042190
ssib001102940
ssib002263599
ssib023646305
ssib051375744
ssib025702191
Score 1.980083
Snippet 为了对轻量级分组密码TWINE的安全性进行研究,分析了轻量级分组密码TWINE的抗差分故障攻击特性,给出了TWINE一种差分故障分析方法,采用面向半字节的随机故障模型对TWINE算法进行攻击。实验结果表明,在35轮注入4次故障后可将密钥空间降低至约220,平均注入13.15次故障后可完全恢复80...
TP309.2; 为了对轻量级分组密码TWINE的安全性进行研究,分析了轻量级分组密码TWINE的抗差分故障攻击特性,给出了TWINE一种差分故障分析方法,采用面向半字节的随机故障模型对TWINE算法进行攻击.实验结果表明,在35轮注入4次故障后可将密钥空间降低至约220,平均注入13.15次故障后可完全恢复80...
SourceID wanfang
chongqing
SourceType Aggregation Database
Publisher
StartPage 1796
SubjectTerms TWINE
安全性
差分故障攻击
轻量级分组密码
随机故障模型
Title 轻量级分组密码TWINE的差分故障攻击
URI http://lib.cqvip.com/qk/93231X/201506/664677429.html
https://d.wanfangdata.com.cn/periodical/jsjyyyj201506043
Volume 32
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR09bxMx1CqthFj4RpQCKhIe0-Z8ts8e7eSigkSnILpFvqTXqkMKtB3aDVRaNhZYKgY2NhiRiPg5aei_4D3bTU4FocJycp6f_b7u_J4d-5mQh0nZXRWJK2pa9WCC0k3TmuOyXmOpFqpIemB2nCg-WZZLT_njFbEydeF1ZdfSznax0N3747mS_7EqwMCueEr2Hyw77hQAUAb7whMsDM9z2ZjmitomtZbmmsKsXrVonlFrqMloLqhSVEkPsVRxhJhWhJg6hJDtZ4-Wc_ylTay3UJNXmkqqoSywe8DRDQ_hnqBAgtZWg1tkB5qbxFPIqc48fgM5ws4NtkVynBoVuQgQo6kdLxF6XGhdj62VndRoappeTEkVo0ZGpnVzgiJRJVr5xsB2SnNgGBhrVhc4wuFO_zKO67EvbbE1QoznGjoDHhMsAALSA8zUq0SdQrxadcvbIPWSaaSPkKBR4UUEjXq1GR7NE5t7fVgRIUFqZXAHShDfBKOmqHXW8HShW9856FhpAPrcSbLiX3AHWyrDvaKnDmiywHvGm8BgKSuRSaJ8UtffvF6qpfZeD0ksjEngvkXhk9OGRFhn8opvbG3s7u5usJhjMr1AZliWJWKazBjbtK1JUA0xaDXJIsP8RZNJLN5AICteA69FBDc49hoiSTPh71gI8RGHypAjJPJ5EUaMIMTi30TA5Cfrm_21FxDS-RN2_dL11yrBYPsquRxncfMmfJLXyNTe-nVy5fSGlPnoMG-QxZ8_BieH70bfPw_fHowG-8OvB6NPr_x3NzraH377AuDjD29Ojj4evx8MDwc3SbuVtxtLtXhFSa0r6zCsZU46LUTpmIRxjbMSQu6yJxmrd5mSjmdOMScBiytXaJmVQhQ9pzUH6Rwv01tkur_ZX71N5rO6cEkvKzP8lwaU7BxM9ktVlK7HyyJxs2RuLH7nechE05Ggepi_MT1LHkSFdOL4tNU5a-A758CZI5ewHNYY75Lp7Zc7q_cg6t4u7sfX4hdI05v0
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E8%BD%BB%E9%87%8F%E7%BA%A7%E5%88%86%E7%BB%84%E5%AF%86%E7%A0%81TWINE%E7%9A%84%E5%B7%AE%E5%88%86%E6%95%85%E9%9A%9C%E6%94%BB%E5%87%BB&rft.jtitle=%E8%AE%A1%E7%AE%97%E6%9C%BA%E5%BA%94%E7%94%A8%E7%A0%94%E7%A9%B6&rft.au=%E5%BE%90%E6%9C%8B&rft.au=%E9%AD%8F%E6%82%A6%E5%B7%9D&rft.au=%E6%BD%98%E6%99%93%E4%B8%AD&rft.date=2015&rft.pub=%E4%B8%AD%E5%9B%BD%E4%BA%BA%E6%B0%91%E6%AD%A6%E8%A3%85%E8%AD%A6%E5%AF%9F%E9%83%A8%E9%98%9F%E5%B7%A5%E7%A8%8B%E5%A4%A7%E5%AD%A6%E7%94%B5%E5%AD%90%E6%8A%80%E6%9C%AF%E7%B3%BB%2C%E8%A5%BF%E5%AE%89%2C710086&rft.issn=1001-3695&rft.volume=32&rft.issue=6&rft.spage=1796&rft.epage=1800&rft_id=info:doi/10.3969%2Fj.issn.1001-3695.2015.06.043&rft.externalDocID=jsjyyyj201506043
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F93231X%2F93231X.jpg
http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fjsjyyyj%2Fjsjyyyj.jpg