GOST的差分故障攻击

为了评估俄罗斯标准密码算法 GOST 的安全性, 提出并讨论了一种针对 GOST 算法的差分故障分析方法. 该方法采用单字节随机故障模型, 利用模加运算部件的特点获取 S 盒的输入差分信息, 并基于 S 盒差分分布统计规律实现密钥恢复. 实验结果表明, 平均7.46次故障引入可以恢复256比特主密钥, 12次故障内完成恢复的实验占比达98, 该方法可以有效地攻击 GOST 算法....

Full description

Saved in:
Bibliographic Details
Published inJournal of Cryptologic Research Vol. 8; no. 4; p. 630
Main Authors XIE, Min, Jia-Qi, LI, TIAN, Feng, 谢敏, 李嘉琪, 田峰
Format Journal Article
LanguageChinese
Published Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 30.08.2021
Subjects
Online AccessGet full text
ISSN2097-4116
DOI10.13868/j.cnki.jcr.000464

Cover

Abstract 为了评估俄罗斯标准密码算法 GOST 的安全性, 提出并讨论了一种针对 GOST 算法的差分故障分析方法. 该方法采用单字节随机故障模型, 利用模加运算部件的特点获取 S 盒的输入差分信息, 并基于 S 盒差分分布统计规律实现密钥恢复. 实验结果表明, 平均7.46次故障引入可以恢复256比特主密钥, 12次故障内完成恢复的实验占比达98, 该方法可以有效地攻击 GOST 算法.
AbstractList 为了评估俄罗斯标准密码算法 GOST 的安全性, 提出并讨论了一种针对 GOST 算法的差分故障分析方法. 该方法采用单字节随机故障模型, 利用模加运算部件的特点获取 S 盒的输入差分信息, 并基于 S 盒差分分布统计规律实现密钥恢复. 实验结果表明, 平均7.46次故障引入可以恢复256比特主密钥, 12次故障内完成恢复的实验占比达98, 该方法可以有效地攻击 GOST 算法.
Author 李嘉琪
XIE, Min
谢敏
TIAN, Feng
田峰
Jia-Qi, LI
Author_xml – sequence: 1
  givenname: Min
  surname: XIE
  fullname: XIE, Min
– sequence: 2
  givenname: LI
  surname: Jia-Qi
  fullname: Jia-Qi, LI
– sequence: 3
  givenname: Feng
  surname: TIAN
  fullname: TIAN, Feng
– sequence: 4
  fullname: 谢敏
– sequence: 5
  fullname: 李嘉琪
– sequence: 6
  fullname: 田峰
BookMark eNotjztOw0AUALcIEiHkANBS2-zbt5_nEkUQkCKlINTR7npXikF2sMkN-B0Amogz0FLkPA7iFrEUqulmNEesV1ZlYOwUeApIms6L1Jf3i7Twdco5l1r2WF_wzCQSQB-yYdMsHFdKIwkJfXYynt7OftfP7c93-_66_Xz5W39tPzbt2-aYHUT70IThPwfs7upyNrpOJtPxzehikixBECWIwWmZq0gyymh4bsGTQkKvXEdDPs-EQWODtwp8tIC5V0YFF2wEp3HAzvbeZV09rkLzNC-qVV12ybmgTIEU3RjuAIQfRis
ContentType Journal Article
Copyright 2021. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2021. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID JQ2
DOI 10.13868/j.cnki.jcr.000464
DatabaseName ProQuest Computer Science Collection
DatabaseTitle ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection
DeliveryMethod fulltext_linktorsrc
GroupedDBID -SI
-S~
ALMA_UNASSIGNED_HOLDINGS
CAJEI
JQ2
PB1
PB9
Q--
ID FETCH-LOGICAL-p1288-33eb64d5f84f4f70da1c85383c5b85378cd92737aeca51cfa13dc575ebeaf1b63
ISSN 2097-4116
IngestDate Mon Jun 30 08:38:06 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 4
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p1288-33eb64d5f84f4f70da1c85383c5b85378cd92737aeca51cfa13dc575ebeaf1b63
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2895142138
PQPubID 6503834
ParticipantIDs proquest_journals_2895142138
PublicationCentury 2000
PublicationDate 2021-08-30
PublicationDateYYYYMMDD 2021-08-30
PublicationDate_xml – month: 08
  year: 2021
  text: 2021-08-30
  day: 30
PublicationDecade 2020
PublicationPlace Beijing
PublicationPlace_xml – name: Beijing
PublicationTitle Journal of Cryptologic Research
PublicationYear 2021
Publisher Chinese Association for Cryptologic Research, Journal of Cryptologic Research
Publisher_xml – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research
SSID ssib055638241
ssib058688234
Score 2.265185
Snippet 为了评估俄罗斯标准密码算法 GOST 的安全性, 提出并讨论了一种针对 GOST 算法的差分故障分析方法. 该方法采用单字节随机故障模型, 利用模加运算部件的特点获取 S 盒的输入差分信息, 并基于 S 盒差分分布统计规律实现密钥恢复. 实验结果表明, 平均7.46次故障引入可以恢复256比特主密钥,...
SourceID proquest
SourceType Aggregation Database
StartPage 630
SubjectTerms Algorithms
Encryption
Modular units
Title GOST的差分故障攻击
URI https://www.proquest.com/docview/2895142138
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NbtQwELaW9sIFgQBRKKgHfExxEid2jsnKS1tV2xay0t5Wie1AQVqqZXugR8TfA8Cl4hm4cujzbBFvwdhOsou2_F4cy7HisWc8_mLPjBG6r4gueEwjTxFaepQR0INKV54kRBNaAEDQNtpnP94a0J1hNOx0Xi9YLR1Py015cqFfyf9wFcqAr8ZL9h84234UCiAP_IUUOAzpX_H44d7jHAuGkxRzikWEM4ZTYTKcYx5jEeME8hEWiamTdG0JxVlm6zDI_AKcdievjqZOL7bGeQ1vhtvCGdy3crVzWHgHzs263YTNt1NrQQAD9qQpw4LjjOA0aCjrLW46BG4XlbRiYu721iZwylyErFXkRcS5k4A_0291XkAS5lHfuV82CpovyCFdULaxo2hpEQh5zO0qIMfPDzefyYkNyeqCpf8ccbu_N-oNdndHuRjml9BqwJg56l_NRH__UaOVTAQ1HsxBYwRf54E1V2iprb2xTMMPlppdWuUtdMmvoiv1sGykToCuoc7J0-tozQjPt9M3s69fZh_enX96-_308_nHs9n7sxto0BN5d8ur78nwjgBdAGNCXcZURRWnFa0YUYUvAYXxUEYlPBmXKgGUygoti8iXVeGHSppZWOqi8ss4vIlWxi_G-hbaCAAtM53AlFUALU20SCqpVoVkQan8Uq2h9aYvo3oivBzBPzvA7gC6f_v3r--gy3NhWkcr08mxvguYblreqwf9B2XMSA4
linkProvider ProQuest
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=GOST%E7%9A%84%E5%B7%AE%E5%88%86%E6%95%85%E9%9A%9C%E6%94%BB%E5%87%BB&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=XIE%2C+Min&rft.au=Jia-Qi%2C+LI&rft.au=TIAN%2C+Feng&rft.au=%E8%B0%A2%E6%95%8F&rft.date=2021-08-30&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=8&rft.issue=4&rft.spage=630&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000464&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon