| 注册
首页|期刊导航|计算机技术与发展|分组密码AES-128的差分故障攻击

分组密码AES-128的差分故障攻击

刘祥忠

计算机技术与发展2012,Vol.22Issue(9):221-224,4.
计算机技术与发展2012,Vol.22Issue(9):221-224,4.

分组密码AES-128的差分故障攻击

A Differential Fault Analysis Attack Against AES-128

刘祥忠1

作者信息

  • 1. 山东师范大学第二附属中学,山东济南250014
  • 折叠

摘要

Abstract

The advanced encryption standard is short for AES. It has another name Rijndael. It is one of the most popular ciphers in the world and is widely used for both commercial and government purposes. It has three versions( AES-128, AES-192 and AES-256). Differential fault analysis assumes that an attacker can induce faults into a system and collect the correct as well as the faulty behaviors. The attacker compares the two ciphers in order to retrieve the secret key. In this paper,present differential fault attacks on the block cipher AES-128 when error injected at the beginning of round 8 and round 7. The method proposed can recover subkey through 2 and 4 faults on average. The attack has a time complexity of 234(2112) time for full key recovery for the two fault injected model correspondingly.

关键词

AES-128/分组密码/差分故障攻击

Key words

AES-128/ block cipher/differential fault analysis

分类

信息技术与安全科学

引用本文复制引用

刘祥忠..分组密码AES-128的差分故障攻击[J].计算机技术与发展,2012,22(9):221-224,4.

基金项目

山东省自然基金(Y2008G01) (Y2008G01)

山东省高等学校优秀青年教师国内访问学者项目 ()

计算机技术与发展

OACSTPCD

1673-629X

访问量0
|
下载量0
段落导航相关论文