首页> 外文会议>Progress in cryptology - AFRICACRYPT 2011 >An Improved Differential Fault Analysis on AES-256
【24h】

An Improved Differential Fault Analysis on AES-256

机译:AES-256的改进的差分故障分析

获取原文
获取原文并翻译 | 示例

摘要

In this paper we present an improved differential fault attack on the Advanced Encryption Standard (AES) with 256-bit key. We show an improved attack which retrieves the AES-256 key using two pairs of fault free and faulty ciphertexts and a brute-force search of 216 with a time complexity 2~(32). The attack retrieves the secret key within approximately 45 minutes, running on desktop Intel Core? 2 Duo processor of 3GHz speed. To the best of the knowledge of the authors, this is the most optimized fault attack on AES-256 among reported results requiring only two faulty ciphertexts.
机译:在本文中,我们针对具有256位密钥的高级加密标准(AES)提出了一种改进的差分故障攻击。我们展示了一种改进的攻击方法,该方法使用两对无错和有误的密文和216的蛮力搜索来检索AES-256密钥,时间复杂度为2〜(32)。该攻击大约在45分钟内检索了在台式机Intel Core上运行的密钥。 2 GHz速度的双核处理器。据作者所知,这是仅需要两个错误密文的报告结果中对AES-256的最优化的故障攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号