SHACAL-2~*算法的差分故障攻击
采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512 bit的种子密钥需要204个随机故障。SHACAL-2*算法可以找到两个有效的差分故障位置,而SHACAL-2算法只有一个有效的差分故障位置。因此,从实施差分故障攻击的难易程度看,SHACAL-2*算法抵抗差分故障攻击的能力弱于SHACAL-2算法。...
Saved in:
Published in | 计算机应用研究 Vol. 31; no. 10; pp. 3122 - 3124 |
---|---|
Main Author | |
Format | Journal Article |
Language | Chinese |
Published |
国防科学技术大学理学院数学与系统科学系,长沙,410073
2014
|
Subjects | |
Online Access | Get full text |
ISSN | 1001-3695 |
DOI | 10.3969/j.issn.1001-3695.2014.10.059 |
Cover
Abstract | 采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512 bit的种子密钥需要204个随机故障。SHACAL-2*算法可以找到两个有效的差分故障位置,而SHACAL-2算法只有一个有效的差分故障位置。因此,从实施差分故障攻击的难易程度看,SHACAL-2*算法抵抗差分故障攻击的能力弱于SHACAL-2算法。 |
---|---|
AbstractList | TN918; 采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512 bit的种子密钥需要204个随机故障.SHACAL-2*算法可以找到两个有效的差分故障位置,而SHACAL-2算法只有一个有效的差分故障位置.因此,从实施差分故障攻击的难易程度看,SHACAL-2*算法抵抗差分故障攻击的能力弱于SHACAL-2算法. 采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512 bit的种子密钥需要204个随机故障。SHACAL-2*算法可以找到两个有效的差分故障位置,而SHACAL-2算法只有一个有效的差分故障位置。因此,从实施差分故障攻击的难易程度看,SHACAL-2*算法抵抗差分故障攻击的能力弱于SHACAL-2算法。 |
Author | 沈璇 赵光耀 李超 |
AuthorAffiliation | 国防科学技术大学理学院数学与系统科学系,长沙410073 |
AuthorAffiliation_xml | – name: 国防科学技术大学理学院数学与系统科学系,长沙,410073 |
Author_FL | ZHAO Guang-yao LI Chao SHEN Xuan |
Author_FL_xml | – sequence: 1 fullname: SHEN Xuan – sequence: 2 fullname: ZHAO Guang-yao – sequence: 3 fullname: LI Chao |
Author_xml | – sequence: 1 fullname: 沈璇 赵光耀 李超 |
BookMark | eNo9jz1Lw0AYx2-oYFv9EiLokvjc5e6SG0tRKxQc7B7ukruaoBdtEMni5BvOFqH4Gbo4ONSvkxQnv4JXKk4P_4cf_5cOatnCaoR2MfiB4OIg97OytD4GwF7ABfMJYOqkD0y0UPv_v4k6ZZkDUIIFtNHe2aDX7w09cvfz9bKcvzUf0-Xsvv6c18-PzfThe_bevC7qp8UW2jDyotTbf7eLRkeHo_7AG54en6wMEg7CYylgjZmioVEqMikOwtAwhqVSnGhFdSo1JBIoVjxihJlUUK1D1zRJtGYm6KL9te2ttEbacZwXNxPrAuO8zKuqyler3BYmHLqzRpPzwo6vMwdfTbJLOalizgmOgEQ0-AVH41w2 |
ClassificationCodes | TN918 |
ContentType | Journal Article |
Copyright | Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
Copyright_xml | – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
DBID | 2RA 92L CQIGP W92 ~WA 2B. 4A8 92I 93N PSX TCJ |
DOI | 10.3969/j.issn.1001-3695.2014.10.059 |
DatabaseName | 维普期刊资源整合服务平台 中文科技期刊数据库-CALIS站点 维普中文期刊数据库 中文科技期刊数据库-工程技术 中文科技期刊数据库- 镜像站点 Wanfang Data Journals - Hong Kong WANFANG Data Centre Wanfang Data Journals 万方数据期刊 - 香港版 China Online Journals (COJ) China Online Journals (COJ) |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
DocumentTitleAlternate | Differential fault analysis on SHACAL-2 |
DocumentTitle_FL | Differential fault analysis on SHACAL-2 |
EndPage | 3124 |
ExternalDocumentID | jsjyyyj201410059 662180284 |
GrantInformation_xml | – fundername: 国家自然科学基金资助项目; 国家“973”计划资助项目 funderid: (61103192); (2013CB338002) |
GroupedDBID | -0Y 2B. 2C0 2RA 5XA 5XJ 92H 92I 92L ACGFS ALMA_UNASSIGNED_HOLDINGS CCEZO CQIGP CUBFJ CW9 TCJ TGT U1G U5S W92 ~WA 4A8 93N ABJNI PSX |
ID | FETCH-LOGICAL-c609-5d01e15b47fbb8fd1377f551abb62eb4edae0ca041b68525fd94ee7014ccee5f3 |
ISSN | 1001-3695 |
IngestDate | Thu May 29 03:54:50 EDT 2025 Wed Feb 14 10:34:24 EST 2024 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 10 |
Keywords | random fault model SHACAL-2 algorithm differential fault attack 差分故障攻击 SHACAL-2算法 随机故障模型 |
Language | Chinese |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c609-5d01e15b47fbb8fd1377f551abb62eb4edae0ca041b68525fd94ee7014ccee5f3 |
Notes | 51-1196/TP This paper used the technique of differential fault attack on the SHACAL- 2 * based on word-oriented fault model. Both theoretical results and experimental data demonstrate that 160 random faults are needed to obtain 512 bit key with suc- cessful probability more than 60% , while 204 random faults are needed to obtain 512 bit key with successful probability more than 97%. The paper found two effective differential fault positions in the SHACAL-2* , while one could be found in the SHACAL-2. Therefore,according to the difficulty degree of carrying out differential fault attack, SHACAL-2* is weaker than SHACAL-2 in the aspect of resistance differential fault attack. SHEN Xuan, ZHAO Guang-yao, LI Chao ( Dept. of Mathematics & Systems Science, College of Science, National University of Defense Technology, Changsha 410073, China ) random fault model ; SHACAL-2* algorithm ; differential fault attack |
PageCount | 3 |
ParticipantIDs | wanfang_journals_jsjyyyj201410059 chongqing_primary_662180284 |
PublicationCentury | 2000 |
PublicationDate | 2014 |
PublicationDateYYYYMMDD | 2014-01-01 |
PublicationDate_xml | – year: 2014 text: 2014 |
PublicationDecade | 2010 |
PublicationTitle | 计算机应用研究 |
PublicationTitleAlternate | Application Research of Computers |
PublicationTitle_FL | Application Research of Computers |
PublicationYear | 2014 |
Publisher | 国防科学技术大学理学院数学与系统科学系,长沙,410073 |
Publisher_xml | – name: 国防科学技术大学理学院数学与系统科学系,长沙,410073 |
SSID | ssj0042190 ssib001102940 ssib002263599 ssib023646305 ssib051375744 ssib025702191 |
Score | 1.9405721 |
Snippet | 采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512... TN918; 采用基于字的随机故障模型对SHACAL-2*算法进行差分故障攻击,理论结果和实验数据都表明以超过60%的成功概率恢复512 bit的种子密钥需要160个随机故障,以超过97%的成功概率恢复512... |
SourceID | wanfang chongqing |
SourceType | Aggregation Database Publisher |
StartPage | 3122 |
SubjectTerms | SHACAL-2*算法 差分故障攻击 随机故障模型 |
Title | SHACAL-2~*算法的差分故障攻击 |
URI | http://lib.cqvip.com/qk/93231X/201410/662180284.html https://d.wanfangdata.com.cn/periodical/jsjyyyj201410059 |
Volume | 31 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6FVEJceKOWAgpSVxwqBz_W-zjaqaMIAReC1FtkO-tWOaRA00N64MRLnKmQKn5DLxw4lL-TVJz4C8ysN64rVRUgWdZmPLs79qzH3252ZghZY6kG3Km1wwALO0zx1Elz7Tt-Vgidw6y5MP-YPnvOey_Zk81ws9HYq3uXTLJ2vn-uX8n_aBVooFf0kv0HzVaNAgHKoF84g4bh_Fc6ftGDJ_nU8alIaNKlcYfKiCaCRglVgiacxgFVIVJURCWjSUhjcxUKUlLJkQcYJPAo5FEdQ2E0jg2PgEIdvtJEYvXIO9ML1Ioj03iEdbE7RiNpeFxLiRSNq0VAI5qPIiAvFMQ6thyHeCRGHqmQIl041k0fG1QmhonTMvvOYq2i9A61hhW3bgW8TKi5sLzW_tsR5tbsaOCV3sr2mww_2Xn2PlBcGXuPfbSrPnDHHmvjpj0bbfxsRG3OfYx7J9klsuQL4YVNshTFG3H3FEcC7KrHFfQxZM_pvA2D7vOaocRMgGD5K0MZeoEITVqBEhIwuFiGxbACXiZrVvrHF8mO8T62d8ZbrwHFGKeycZGOt2r4p3-dXLUTl1ZUjsIbpLG_fZNcWyQFadlvxC3yaDEo3_7--fnk6Ov8-8HJ4bvZj6PZpw_zg_e_Dr_NvxzPPh7fJv1u0u_0HJuNw8m5q5xw6HraCzMmiiyTxRAjVRYAt9Ms477OmB7CW5-nLvMyLkM_LIaKaS3gZnLAYWER3CHN8c5YL5MWLmIXPCvcDNQauEUqch6IIUJnXQBmXSGr1W0PXpVBVwaV0lbIQ_sgBvZV3B2MdkfT6XTkm13L8ODuXtjCKrmCnOVC2j3SnLzZ0_cBWk6yB3Yg_AFuqFZE |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SHACAL-2%7E%EF%BC%8A%E7%AE%97%E6%B3%95%E7%9A%84%E5%B7%AE%E5%88%86%E6%95%85%E9%9A%9C%E6%94%BB%E5%87%BB&rft.jtitle=%E8%AE%A1%E7%AE%97%E6%9C%BA%E5%BA%94%E7%94%A8%E7%A0%94%E7%A9%B6&rft.au=%E6%B2%88%E7%92%87+%E8%B5%B5%E5%85%89%E8%80%80+%E6%9D%8E%E8%B6%85&rft.date=2014&rft.issn=1001-3695&rft.volume=31&rft.issue=10&rft.spage=3122&rft.epage=3124&rft_id=info:doi/10.3969%2Fj.issn.1001-3695.2014.10.059&rft.externalDocID=662180284 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F93231X%2F93231X.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fjsjyyyj%2Fjsjyyyj.jpg |