GOST的差分故障攻击
为了评估俄罗斯标准密码算法 GOST 的安全性, 提出并讨论了一种针对 GOST 算法的差分故障分析方法. 该方法采用单字节随机故障模型, 利用模加运算部件的特点获取 S 盒的输入差分信息, 并基于 S 盒差分分布统计规律实现密钥恢复. 实验结果表明, 平均7.46次故障引入可以恢复256比特主密钥, 12次故障内完成恢复的实验占比达98, 该方法可以有效地攻击 GOST 算法....
Saved in:
Published in | Journal of Cryptologic Research Vol. 8; no. 4; p. 630 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | Chinese |
Published |
Beijing
Chinese Association for Cryptologic Research, Journal of Cryptologic Research
30.08.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 2097-4116 |
DOI | 10.13868/j.cnki.jcr.000464 |
Cover
Abstract | 为了评估俄罗斯标准密码算法 GOST 的安全性, 提出并讨论了一种针对 GOST 算法的差分故障分析方法. 该方法采用单字节随机故障模型, 利用模加运算部件的特点获取 S 盒的输入差分信息, 并基于 S 盒差分分布统计规律实现密钥恢复. 实验结果表明, 平均7.46次故障引入可以恢复256比特主密钥, 12次故障内完成恢复的实验占比达98, 该方法可以有效地攻击 GOST 算法. |
---|---|
AbstractList | 为了评估俄罗斯标准密码算法 GOST 的安全性, 提出并讨论了一种针对 GOST 算法的差分故障分析方法. 该方法采用单字节随机故障模型, 利用模加运算部件的特点获取 S 盒的输入差分信息, 并基于 S 盒差分分布统计规律实现密钥恢复. 实验结果表明, 平均7.46次故障引入可以恢复256比特主密钥, 12次故障内完成恢复的实验占比达98, 该方法可以有效地攻击 GOST 算法. |
Author | 李嘉琪 XIE, Min 谢敏 TIAN, Feng 田峰 Jia-Qi, LI |
Author_xml | – sequence: 1 givenname: Min surname: XIE fullname: XIE, Min – sequence: 2 givenname: LI surname: Jia-Qi fullname: Jia-Qi, LI – sequence: 3 givenname: Feng surname: TIAN fullname: TIAN, Feng – sequence: 4 fullname: 谢敏 – sequence: 5 fullname: 李嘉琪 – sequence: 6 fullname: 田峰 |
BookMark | eNotjztOw0AUALcIEiHkANBS2-zbt5_nEkUQkCKlINTR7npXikF2sMkN-B0Amogz0FLkPA7iFrEUqulmNEesV1ZlYOwUeApIms6L1Jf3i7Twdco5l1r2WF_wzCQSQB-yYdMsHFdKIwkJfXYynt7OftfP7c93-_66_Xz5W39tPzbt2-aYHUT70IThPwfs7upyNrpOJtPxzehikixBECWIwWmZq0gyymh4bsGTQkKvXEdDPs-EQWODtwp8tIC5V0YFF2wEp3HAzvbeZV09rkLzNC-qVV12ybmgTIEU3RjuAIQfRis |
ContentType | Journal Article |
Copyright | 2021. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2021. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | JQ2 |
DOI | 10.13868/j.cnki.jcr.000464 |
DatabaseName | ProQuest Computer Science Collection |
DatabaseTitle | ProQuest Computer Science Collection |
DatabaseTitleList | ProQuest Computer Science Collection |
DeliveryMethod | fulltext_linktorsrc |
GroupedDBID | -SI -S~ ALMA_UNASSIGNED_HOLDINGS CAJEI JQ2 PB1 PB9 Q-- |
ID | FETCH-LOGICAL-p1288-33eb64d5f84f4f70da1c85383c5b85378cd92737aeca51cfa13dc575ebeaf1b63 |
ISSN | 2097-4116 |
IngestDate | Mon Jun 30 08:38:06 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 4 |
Language | Chinese |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p1288-33eb64d5f84f4f70da1c85383c5b85378cd92737aeca51cfa13dc575ebeaf1b63 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2895142138 |
PQPubID | 6503834 |
ParticipantIDs | proquest_journals_2895142138 |
PublicationCentury | 2000 |
PublicationDate | 2021-08-30 |
PublicationDateYYYYMMDD | 2021-08-30 |
PublicationDate_xml | – month: 08 year: 2021 text: 2021-08-30 day: 30 |
PublicationDecade | 2020 |
PublicationPlace | Beijing |
PublicationPlace_xml | – name: Beijing |
PublicationTitle | Journal of Cryptologic Research |
PublicationYear | 2021 |
Publisher | Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
Publisher_xml | – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
SSID | ssib055638241 ssib058688234 |
Score | 2.265185 |
Snippet | 为了评估俄罗斯标准密码算法 GOST 的安全性, 提出并讨论了一种针对 GOST 算法的差分故障分析方法. 该方法采用单字节随机故障模型, 利用模加运算部件的特点获取 S 盒的输入差分信息, 并基于 S 盒差分分布统计规律实现密钥恢复. 实验结果表明, 平均7.46次故障引入可以恢复256比特主密钥,... |
SourceID | proquest |
SourceType | Aggregation Database |
StartPage | 630 |
SubjectTerms | Algorithms Encryption Modular units |
Title | GOST的差分故障攻击 |
URI | https://www.proquest.com/docview/2895142138 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NbtQwELaW9sIFgQBRKKgHfExxEid2jsnKS1tV2xay0t5Wie1AQVqqZXugR8TfA8Cl4hm4cujzbBFvwdhOsou2_F4cy7HisWc8_mLPjBG6r4gueEwjTxFaepQR0INKV54kRBNaAEDQNtpnP94a0J1hNOx0Xi9YLR1Py015cqFfyf9wFcqAr8ZL9h84234UCiAP_IUUOAzpX_H44d7jHAuGkxRzikWEM4ZTYTKcYx5jEeME8hEWiamTdG0JxVlm6zDI_AKcdievjqZOL7bGeQ1vhtvCGdy3crVzWHgHzs263YTNt1NrQQAD9qQpw4LjjOA0aCjrLW46BG4XlbRiYu721iZwylyErFXkRcS5k4A_0291XkAS5lHfuV82CpovyCFdULaxo2hpEQh5zO0qIMfPDzefyYkNyeqCpf8ccbu_N-oNdndHuRjml9BqwJg56l_NRH__UaOVTAQ1HsxBYwRf54E1V2iprb2xTMMPlppdWuUtdMmvoiv1sGykToCuoc7J0-tozQjPt9M3s69fZh_enX96-_308_nHs9n7sxto0BN5d8ur78nwjgBdAGNCXcZURRWnFa0YUYUvAYXxUEYlPBmXKgGUygoti8iXVeGHSppZWOqi8ss4vIlWxi_G-hbaCAAtM53AlFUALU20SCqpVoVkQan8Uq2h9aYvo3oivBzBPzvA7gC6f_v3r--gy3NhWkcr08mxvguYblreqwf9B2XMSA4 |
linkProvider | ProQuest |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=GOST%E7%9A%84%E5%B7%AE%E5%88%86%E6%95%85%E9%9A%9C%E6%94%BB%E5%87%BB&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=XIE%2C+Min&rft.au=Jia-Qi%2C+LI&rft.au=TIAN%2C+Feng&rft.au=%E8%B0%A2%E6%95%8F&rft.date=2021-08-30&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=8&rft.issue=4&rft.spage=630&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000464&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon |