| 注册
首页|期刊导航|计算机工程与科学|PRESENT的多模型差分错误分析

PRESENT的多模型差分错误分析

唐明 沈菲 邓慧 尹鹏 邱镇龙 马啸 张焕国

计算机工程与科学2011,Vol.33Issue(10):39-44,6.
计算机工程与科学2011,Vol.33Issue(10):39-44,6.DOI:10.3969/j.issn.1007-130X.2011.10.007

PRESENT的多模型差分错误分析

A Multi-model Differential Fault Analysis on PRESENT

唐明 1沈菲 2邓慧 2尹鹏 2邱镇龙 2马啸 2张焕国2

作者信息

  • 1. 武汉大学信息安全与可信计算机教育部重点实验室,湖北武汉430072
  • 2. 武汉大学计算机学院,湖北武汉430072
  • 折叠

摘要

Abstract

PRESENT is an ultra-lightweight block cipher which is suitable for lightweight hardware such as the RFID tags and sensor networks. In this paper, the strength of PRESENT against the differential fault analysis is explored. We present four kinds of fault models of differential fault analysis on PRESENT. Comparing these methods, we come up with the best method to analyse PRESENT using differential fault analysis. Up to now, our method is proved to be more efficient than the existing differential fault analysts on DFA in the published papers. The best result is, by introducing a 8 bit random error between the 28th round permutation and the 29th round permutation, we can recover a 64 bit post-whitening key on an average of 17 fault samples.

关键词

密码分析/差分错误分析/轻量密码/PRESENT密码

Key words

cryptanalysis/differential fault analysis/lightweight cipher/PRESENT

分类

信息技术与安全科学

引用本文复制引用

唐明,沈菲,邓慧,尹鹏,邱镇龙,马啸,张焕国..PRESENT的多模型差分错误分析[J].计算机工程与科学,2011,33(10):39-44,6.

基金项目

国家自然科学基金资助项目(60970116,60970115,90718006) (60970116,60970115,90718006)

计算机工程与科学

OA北大核心CSCDCSTPCD

1007-130X

访问量0
|
下载量0
段落导航相关论文