计算机工程与科学2011,Vol.33Issue(10):39-44,6.DOI:10.3969/j.issn.1007-130X.2011.10.007
PRESENT的多模型差分错误分析
A Multi-model Differential Fault Analysis on PRESENT
摘要
Abstract
PRESENT is an ultra-lightweight block cipher which is suitable for lightweight hardware such as the RFID tags and sensor networks. In this paper, the strength of PRESENT against the differential fault analysis is explored. We present four kinds of fault models of differential fault analysis on PRESENT. Comparing these methods, we come up with the best method to analyse PRESENT using differential fault analysis. Up to now, our method is proved to be more efficient than the existing differential fault analysts on DFA in the published papers. The best result is, by introducing a 8 bit random error between the 28th round permutation and the 29th round permutation, we can recover a 64 bit post-whitening key on an average of 17 fault samples.关键词
密码分析/差分错误分析/轻量密码/PRESENT密码Key words
cryptanalysis/differential fault analysis/lightweight cipher/PRESENT分类
信息技术与安全科学引用本文复制引用
唐明,沈菲,邓慧,尹鹏,邱镇龙,马啸,张焕国..PRESENT的多模型差分错误分析[J].计算机工程与科学,2011,33(10):39-44,6.基金项目
国家自然科学基金资助项目(60970116,60970115,90718006) (60970116,60970115,90718006)