首页> 外文会议>CSS 2013 >An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space
【24h】

An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space

机译:使用减少的搜索空间改进的差分故障分析攻击AES

获取原文

摘要

Differential Power Analysis against AES proved to be effective, with use mask techniques, we can truncate the relevance and defense DPA attacks successfully. In this paper, we introduce a new mean called DFA (Differential Fault Attack), DFA has been shown successfully to attack AES algorithm with masking. We inject a fault to the intermediate results and other general form to obtain the ciphertext with faults, using the ciphertext we can recover the keys. Firstly, we construct the Sbox / InvSbox distribution tables to make the results sets space is less than 2~8 with two correct/fault ciphertexts pairs, even, in most cases, the set space are strict in 2~2. Secondly, we also demonstrated that the model of DFA we constructed can ignore the masking techniques and propose some methods to recover the keys with less time consuming and reduced searching space. Lastly, we make the module into an application and prove the module is effective.
机译:针对AES的差分功率分析证明是有效的,使用掩模技术,我们可以成功截断相关性和防御DPA攻击。在本文中,我们介绍了一种名为DFA(差分故障攻击)的新均成功显示了DFA,以攻击掩蔽AES算法。我们将故障注入中间结果和其他常规表单以获取具有故障的密文,使用密文我们可以恢复键。首先,我们构建SBOX / INVSBOX分发表以使结果设置空间小于2〜8,两个正确/故障密文对,即使在大多数情况下,设定空间都在2〜2中严格。其次,我们还证明了我们构造的DFA模型可以忽略掩蔽技术,并提出一些方法来恢复钥匙,耗时耗尽和减少搜索空间。最后,我们将模块变为应用程序并证明模块是有效的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号