计算机技术与发展2012,Vol.22Issue(9):221-224,4.
分组密码AES-128的差分故障攻击
A Differential Fault Analysis Attack Against AES-128
摘要
Abstract
The advanced encryption standard is short for AES. It has another name Rijndael. It is one of the most popular ciphers in the world and is widely used for both commercial and government purposes. It has three versions( AES-128, AES-192 and AES-256). Differential fault analysis assumes that an attacker can induce faults into a system and collect the correct as well as the faulty behaviors. The attacker compares the two ciphers in order to retrieve the secret key. In this paper,present differential fault attacks on the block cipher AES-128 when error injected at the beginning of round 8 and round 7. The method proposed can recover subkey through 2 and 4 faults on average. The attack has a time complexity of 234(2112) time for full key recovery for the two fault injected model correspondingly.关键词
AES-128/分组密码/差分故障攻击Key words
AES-128/ block cipher/differential fault analysis分类
信息技术与安全科学引用本文复制引用
刘祥忠..分组密码AES-128的差分故障攻击[J].计算机技术与发展,2012,22(9):221-224,4.基金项目
山东省自然基金(Y2008G01) (Y2008G01)
山东省高等学校优秀青年教师国内访问学者项目 ()