SHACAL-2~*算法的差分故障攻击

采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512 bit的种子密钥需要204个随机故障。SHACAL-2*算法可以找到两个有效的差分故障位置,而SHACAL-2算法只有一个有效的差分故障位置。因此,从实施差分故障攻击的难易程度看,SHACAL-2*算法抵抗差分故障攻击的能力弱于SHACAL-2算法。...

Full description

Saved in:
Bibliographic Details
Published in计算机应用研究 Vol. 31; no. 10; pp. 3122 - 3124
Main Author 沈璇 赵光耀 李超
Format Journal Article
LanguageChinese
Published 国防科学技术大学理学院数学与系统科学系,长沙,410073 2014
Subjects
Online AccessGet full text
ISSN1001-3695
DOI10.3969/j.issn.1001-3695.2014.10.059

Cover

Abstract 采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512 bit的种子密钥需要204个随机故障。SHACAL-2*算法可以找到两个有效的差分故障位置,而SHACAL-2算法只有一个有效的差分故障位置。因此,从实施差分故障攻击的难易程度看,SHACAL-2*算法抵抗差分故障攻击的能力弱于SHACAL-2算法。
AbstractList TN918; 采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512 bit的种子密钥需要204个随机故障.SHACAL-2*算法可以找到两个有效的差分故障位置,而SHACAL-2算法只有一个有效的差分故障位置.因此,从实施差分故障攻击的难易程度看,SHACAL-2*算法抵抗差分故障攻击的能力弱于SHACAL-2算法.
采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512 bit的种子密钥需要204个随机故障。SHACAL-2*算法可以找到两个有效的差分故障位置,而SHACAL-2算法只有一个有效的差分故障位置。因此,从实施差分故障攻击的难易程度看,SHACAL-2*算法抵抗差分故障攻击的能力弱于SHACAL-2算法。
Author 沈璇 赵光耀 李超
AuthorAffiliation 国防科学技术大学理学院数学与系统科学系,长沙410073
AuthorAffiliation_xml – name: 国防科学技术大学理学院数学与系统科学系,长沙,410073
Author_FL ZHAO Guang-yao
LI Chao
SHEN Xuan
Author_FL_xml – sequence: 1
  fullname: SHEN Xuan
– sequence: 2
  fullname: ZHAO Guang-yao
– sequence: 3
  fullname: LI Chao
Author_xml – sequence: 1
  fullname: 沈璇 赵光耀 李超
BookMark eNo9jz1Lw0AYx2-oYFv9EiLokvjc5e6SG0tRKxQc7B7ukruaoBdtEMni5BvOFqH4Gbo4ONSvkxQnv4JXKk4P_4cf_5cOatnCaoR2MfiB4OIg97OytD4GwF7ABfMJYOqkD0y0UPv_v4k6ZZkDUIIFtNHe2aDX7w09cvfz9bKcvzUf0-Xsvv6c18-PzfThe_bevC7qp8UW2jDyotTbf7eLRkeHo_7AG54en6wMEg7CYylgjZmioVEqMikOwtAwhqVSnGhFdSo1JBIoVjxihJlUUK1D1zRJtGYm6KL9te2ttEbacZwXNxPrAuO8zKuqyler3BYmHLqzRpPzwo6vMwdfTbJLOalizgmOgEQ0-AVH41w2
ClassificationCodes TN918
ContentType Journal Article
Copyright Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
Copyright_xml – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
DBID 2RA
92L
CQIGP
W92
~WA
2B.
4A8
92I
93N
PSX
TCJ
DOI 10.3969/j.issn.1001-3695.2014.10.059
DatabaseName 维普期刊资源整合服务平台
中文科技期刊数据库-CALIS站点
维普中文期刊数据库
中文科技期刊数据库-工程技术
中文科技期刊数据库- 镜像站点
Wanfang Data Journals - Hong Kong
WANFANG Data Centre
Wanfang Data Journals
万方数据期刊 - 香港版
China Online Journals (COJ)
China Online Journals (COJ)
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
DocumentTitleAlternate Differential fault analysis on SHACAL-2
DocumentTitle_FL Differential fault analysis on SHACAL-2
EndPage 3124
ExternalDocumentID jsjyyyj201410059
662180284
GrantInformation_xml – fundername: 国家自然科学基金资助项目; 国家“973”计划资助项目
  funderid: (61103192); (2013CB338002)
GroupedDBID -0Y
2B.
2C0
2RA
5XA
5XJ
92H
92I
92L
ACGFS
ALMA_UNASSIGNED_HOLDINGS
CCEZO
CQIGP
CUBFJ
CW9
TCJ
TGT
U1G
U5S
W92
~WA
4A8
93N
ABJNI
PSX
ID FETCH-LOGICAL-c609-5d01e15b47fbb8fd1377f551abb62eb4edae0ca041b68525fd94ee7014ccee5f3
ISSN 1001-3695
IngestDate Thu May 29 03:54:50 EDT 2025
Wed Feb 14 10:34:24 EST 2024
IsPeerReviewed false
IsScholarly true
Issue 10
Keywords random fault model
SHACAL-2 algorithm
differential fault attack
差分故障攻击
SHACAL-2算法
随机故障模型
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c609-5d01e15b47fbb8fd1377f551abb62eb4edae0ca041b68525fd94ee7014ccee5f3
Notes 51-1196/TP
This paper used the technique of differential fault attack on the SHACAL- 2 * based on word-oriented fault model. Both theoretical results and experimental data demonstrate that 160 random faults are needed to obtain 512 bit key with suc- cessful probability more than 60% , while 204 random faults are needed to obtain 512 bit key with successful probability more than 97%. The paper found two effective differential fault positions in the SHACAL-2* , while one could be found in the SHACAL-2. Therefore,according to the difficulty degree of carrying out differential fault attack, SHACAL-2* is weaker than SHACAL-2 in the aspect of resistance differential fault attack.
SHEN Xuan, ZHAO Guang-yao, LI Chao ( Dept. of Mathematics & Systems Science, College of Science, National University of Defense Technology, Changsha 410073, China )
random fault model ; SHACAL-2* algorithm ; differential fault attack
PageCount 3
ParticipantIDs wanfang_journals_jsjyyyj201410059
chongqing_primary_662180284
PublicationCentury 2000
PublicationDate 2014
PublicationDateYYYYMMDD 2014-01-01
PublicationDate_xml – year: 2014
  text: 2014
PublicationDecade 2010
PublicationTitle 计算机应用研究
PublicationTitleAlternate Application Research of Computers
PublicationTitle_FL Application Research of Computers
PublicationYear 2014
Publisher 国防科学技术大学理学院数学与系统科学系,长沙,410073
Publisher_xml – name: 国防科学技术大学理学院数学与系统科学系,长沙,410073
SSID ssj0042190
ssib001102940
ssib002263599
ssib023646305
ssib051375744
ssib025702191
Score 1.9405721
Snippet 采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512...
TN918; 采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512...
SourceID wanfang
chongqing
SourceType Aggregation Database
Publisher
StartPage 3122
SubjectTerms SHACAL-2*算法
差分故障攻击
随机故障模型
Title SHACAL-2~*算法的差分故障攻击
URI http://lib.cqvip.com/qk/93231X/201410/662180284.html
https://d.wanfangdata.com.cn/periodical/jsjyyyj201410059
Volume 31
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6FVEJceKOWAgpSVxwqBz_W-zjaqaMIAReC1FtkO-tWOaRA00N64MRLnKmQKn5DLxw4lL-TVJz4C8ysN64rVRUgWdZmPLs79qzH3252ZghZY6kG3Km1wwALO0zx1Elz7Tt-Vgidw6y5MP-YPnvOey_Zk81ws9HYq3uXTLJ2vn-uX8n_aBVooFf0kv0HzVaNAgHKoF84g4bh_Fc6ftGDJ_nU8alIaNKlcYfKiCaCRglVgiacxgFVIVJURCWjSUhjcxUKUlLJkQcYJPAo5FEdQ2E0jg2PgEIdvtJEYvXIO9ML1Ioj03iEdbE7RiNpeFxLiRSNq0VAI5qPIiAvFMQ6thyHeCRGHqmQIl041k0fG1QmhonTMvvOYq2i9A61hhW3bgW8TKi5sLzW_tsR5tbsaOCV3sr2mww_2Xn2PlBcGXuPfbSrPnDHHmvjpj0bbfxsRG3OfYx7J9klsuQL4YVNshTFG3H3FEcC7KrHFfQxZM_pvA2D7vOaocRMgGD5K0MZeoEITVqBEhIwuFiGxbACXiZrVvrHF8mO8T62d8ZbrwHFGKeycZGOt2r4p3-dXLUTl1ZUjsIbpLG_fZNcWyQFadlvxC3yaDEo3_7--fnk6Ov8-8HJ4bvZj6PZpw_zg_e_Dr_NvxzPPh7fJv1u0u_0HJuNw8m5q5xw6HraCzMmiiyTxRAjVRYAt9Ms477OmB7CW5-nLvMyLkM_LIaKaS3gZnLAYWER3CHN8c5YL5MWLmIXPCvcDNQauEUqch6IIUJnXQBmXSGr1W0PXpVBVwaV0lbIQ_sgBvZV3B2MdkfT6XTkm13L8ODuXtjCKrmCnOVC2j3SnLzZ0_cBWk6yB3Yg_AFuqFZE
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SHACAL-2%7E%EF%BC%8A%E7%AE%97%E6%B3%95%E7%9A%84%E5%B7%AE%E5%88%86%E6%95%85%E9%9A%9C%E6%94%BB%E5%87%BB&rft.jtitle=%E8%AE%A1%E7%AE%97%E6%9C%BA%E5%BA%94%E7%94%A8%E7%A0%94%E7%A9%B6&rft.au=%E6%B2%88%E7%92%87+%E8%B5%B5%E5%85%89%E8%80%80+%E6%9D%8E%E8%B6%85&rft.date=2014&rft.issn=1001-3695&rft.volume=31&rft.issue=10&rft.spage=3122&rft.epage=3124&rft_id=info:doi/10.3969%2Fj.issn.1001-3695.2014.10.059&rft.externalDocID=662180284
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F93231X%2F93231X.jpg
http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fjsjyyyj%2Fjsjyyyj.jpg