首页 | 本学科首页   官方微博 | 高级检索  
     

对流密码算法Phelix的差分故障攻击
引用本文:张中亚,关杰. 对流密码算法Phelix的差分故障攻击[J]. 上海交通大学学报, 2013, 47(7): 1131-1136
作者姓名:张中亚  关杰
作者单位:(1. 信息工程大学,郑州 450004;2.解放军71282部队, 河南 洛阳 471000)
基金项目:国家自然科学基金资助项目
摘    要:流密码算法Phelix是ESTREAM计划的一个候选算法,文中给出了模2n加环节XY=Z的一个基于单比特故障的差分方程组求解算法.利用该算法采用面向比特的故障诱导模型对Phelix进行了差分故障攻击,该攻击理论上只需652个单比特故障就能完全恢复256 bit的工作密钥,计算复杂度为O(220).实验结果显示,Phelix算法对差分故障攻击是不安全的.

关 键 词:流密码   Phelix算法   差分方程   差分故障攻击  
收稿时间:2011-07-20

Differential Analysis of Stream Cipher Phelix
ZHANG Zhong-ya,GUAN Jie. Differential Analysis of Stream Cipher Phelix[J]. Journal of Shanghai Jiaotong University, 2013, 47(7): 1131-1136
Authors:ZHANG Zhong-ya  GUAN Jie
Affiliation:(1. Information Engineering University, Zhengzhou 450004, China; 2. Unit 71282 of the PLA, Luoyang 471000, Henan, China)
Abstract:Phelix is a candidate algorithm for the ESTREAM stream cipher project. An algorithm was presented to solve a system of differential equations based on single-bit fault on XY=Z in this paper. Then a bit-oriented differential fault analysis of Phelix based on the algorithm was shown. Theoretically, the 256-bit working key can be obtained by using 652 bit-faults, with the computational complexity of O(220). The result shows that the stream cipher Phelix is vulnerable to differential fault analysis.
Keywords:stream cipher  Phelix  differential equation  differential fault analysis
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《上海交通大学学报》浏览原始摘要信息
点击此处可从《上海交通大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号