Nothing Special   »   [go: up one dir, main page]

计算机科学 ›› 2015, Vol. 42 ›› Issue (Z11): 352-356.

• 信息安全 • 上一篇    下一篇

针对流密码LEX的差分故障攻击及算法改进分析

李佳雨,石会,邓元庆,龚晶,关宇   

  1. 解放军理工大学通信工程学院 南京210007,解放军理工大学通信工程学院 南京210007,解放军理工大学通信工程学院 南京210007,解放军理工大学通信工程学院 南京210007,解放军理工大学通信工程学院 南京210007
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金项目(61271254)资助

Differential Fault Attack and Analysis of Improvement on LEX

LI Jia-yu, SHI Hui, DENG Yuan-qing, GONG Jing and GUAN Yu   

  • Online:2018-11-14 Published:2018-11-14

摘要: 分析了针对LEX算法的差分故障攻击。为增强LEX抗差分故障攻击的能力,采取将每组轮密钥异或一个128比特随机序列的方法,对其进行了改进。在此基础上,分析了改进算法的安全性和运算速度,并用一个实例仿真检验了改进算法的密钥流随机性。结果表明,改进的LEX算法能够抵抗差分故障攻击,并具备与原LEX算法相同的运算速度和密钥流随机性,提高了LEX算法的密码性能。

关键词: 流密码,LEX,安全性,差分故障攻击,随机性

Abstract: A method of differential fault attack on LEX was analyzed.In order to enhance the ability of stream cipher LEX to resist differential fault attack,based on the idea of making every RoundKey xor a 128-bit random stream,a new version of LEX was proposed.Then the safety and speed of the improved LEX algorithm were analyzed,and an exam-ple was performed to test the randomicity of the improved algorithm’s key stream.The results show that the improved algorithm is resistant to differential fault attack,and simultaneously,has the same computing speed and randomicity to the original LEX algorithm,which is an improvement of LEX.

Key words: Stream cipher,LEX,Security,Differential fault attack,Randomicity

[1] 刘依依.eSTREAM和流密码分析现状[J].信息安全与通信保密,2009,1(12):47-49
[2] Alex B.A new 128 bit key stream cipher LEX[EB/OL].[2005-06-13].http://www.ecrypt.eu.org/stream/ciphers/lex/lex.pdf
[3] National Institute of Standards and Technology(NIST).Announcing the Advanced Encryption Standard(AES) [EB/OL].(2001-11-26).http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
[4] 邓元庆,龚晶,石会.密码学简明教程[M].北京:清华大学出版社,2011:71-93
[5] Henricksen M.Flexible Block Ciphers:Modifying LEX[C]∥Proceedings of ICCSIT2010.Chengdu,2010
[6] Boneh D,DeMillo R A,Lipton R J.On the importance of checking cryptographic protocols for faults[M]∥Advances in Cryptology-EUROCRYPT’97.1997:37-51
[7] Biham E,Shamir A.Differential fault analysis of secret keycryptosystems[M]∥Advances in Crytpology-CRYPTO’97.1997:37-51
[8] Huang J,Susilo W,Seberry J.Differential fault analysis of LEX[C]∥ Proceedings of SCN 2010.Amalfi,Italy,2010
[9] Skorobogatov S,Anderson R.Optical fault induction attacks[M]∥Cryptographic Hardware and Embedded System-CHES 2002.2003:2-12
[10] Giraud C.DFA on AES[M]∥ Advanced Encryption Stardard-AES.2005:27-41
[11] 张中亚,关杰.对流密码算法LEX的差分故障攻击[J].上海交通大学学报,2012,0(6):865-869
[12] 王秋燕,金晨辉.LEX算法的输出位置分析[J].计算机应用与软件,2014,1(10):309-313
[13] 随机性检测规范:GM/T 0005-2012[S].北京:中国标准出版社,2012

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!