MICKEY的差分错误攻击的研究
发布时间:2018-03-06 17:41
本文选题:差分错误攻击 切入点:MICKEY-128 出处:《西安电子科技大学》2015年硕士论文 论文类型:学位论文
【摘要】:随着信息时代的来临,人们对信息的安全越来越重视,各种保护信息安全的密码算法被提出。为了证明这些算法的安全性,就需要不断的用各种分析方法对其进行分析。然而传统的分析方法,例如穷举法攻击,代数攻击,差分攻击只能证明算法理论上的安全性,无法证明算法在硬件设备上实现后的安全性。差分错误攻击方法的提出弥补了这方面的空白,通过采集硬件设备泄露的信息,能够对算法在设备中实现后的安全性进行分析。差分错误攻击的提出不但为密码分析者提供了新的分析方法,还为密码学的研究打开了新的方向。目前对于差分错误攻击方法的研究方向主要在于如何以较小的代价正确快速的恢复出密钥。本文的一个工作就是对基于MICKEY-128 2.0的差分错误攻击的改进,提高了算法工作效率。同时据所查资料显示,在对MICKEY-128 2.0的差分错误攻击的实现方面的研究中,对于并行化技术和分布式计算的引入还是一个空白。本文的另外一个工作就是把这两项内容引入到差分错误攻击的实现中,提高攻击的速度。本文主要的工作内容包括以下两方面:1、对Sandip Karmakar和Dipanwita Roy Chowdhury提出的基于MICKEY-128 2.0的差分错误攻击方法提出了改进。2013年,Sandip Karmakar和Dipanwita Roy Chowdhury对MICKEY-128 2.0给出了一个差分错误攻击方法,利用方法使用480个错误插入和480对正确/错误密钥流即可成功恢复寄存器的初始状态。从错误插入个数的角度来讲,该方法是当时性能最佳的方法。然而在本文中我们指出该方法依然存在不足之处,并且给出了改善的方案,最终得到了改善后的差分错误攻击方法。改进之后的算法在不影响原有算法性能的前提下弥补了它的不足之处,并且适用于其他版本的Mickey密码。2、从工程实现的角度对本文提出的差分错误攻击做了改进。在工程实现中,差分错误攻击需要采集大量的数据进行分析,试错。当数据量过大时,用传统的单一计算机,单线程进行计算将会降低工作效率。为了提高实际操作的效率,本文融入并行化技术,分布式计算等概念,让多个计算机,多条线程同时运行,从而提高速度,缩短破译密钥的时间。在拥有两台运算节点,每个节点配备二核处理器的条件下,引入并行化技术和分布式计算后差分错误攻击的速度将接近原来的3.6倍。
[Abstract]:With the advent of the information age, people pay more and more attention to the security of information, and a variety of cryptographic algorithms are proposed to protect the security of information. However, traditional analysis methods, such as exhaustive attack, algebraic attack and differential attack, can only prove the theoretical security of the algorithm. It is impossible to prove the security of the algorithm after it is implemented on the hardware device. The differential error attack method has made up the blank in this respect, and the information leaked by the hardware device is collected. It can analyze the security of the algorithm after it is implemented in the device. The differential error attack not only provides a new analysis method for cryptographers, but also provides a new analysis method for cryptographers. It also opens a new direction for the research of cryptography. At present, the main research direction of differential error attack is how to recover the key correctly and quickly at a lower cost. One of the work of this paper is to study the problem based on MICKEY-128 2. 0. Improved differential error attack, The efficiency of the algorithm is improved. According to the data collected, the research on the implementation of differential error attack for MICKEY-128 2.0, The introduction of parallelization and distributed computing is still a blank. Another work of this paper is to introduce these two items into the implementation of differential error attack. The main work of this paper includes the following two aspects: 1. This paper proposes an improvement to the differential error attack method based on MICKEY-128 2.0 proposed by Sandip Karmakar and Dipanwita Roy Chowdhury. In 2013, the Sandip Karmakar and Dipanwita Roy Chowdhury gave a difference to MICKEY-128 2.0. Split error attack method, Using the method 480 error inserts and 480 pairs of correct / error key streams are used to successfully restore the initial state of registers. This method is the best method at that time. However, in this paper, we point out that the method still has some shortcomings, and give an improved scheme. Finally, the improved differential error attack method is obtained. The improved algorithm makes up for its shortcomings without affecting the performance of the original algorithm. And it is suitable for other versions of Mickey password. 2. The differential error attack proposed in this paper is improved from the point of view of engineering implementation. In the engineering implementation, the differential error attack needs to collect a lot of data for analysis, trial and error. When the amount of data is too large, In order to improve the efficiency of practical operation, this paper integrates the concepts of parallelization, distributed computing, and so on, so that multiple computers and multiple threads can run at the same time. Under the condition of having two operation nodes and each node equipped with two core processors, the speed of differential error attack after introducing parallelization and distributed computing will be nearly 3.6 times as fast as the original one.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2015
【分类号】:TN918.1
【参考文献】
相关期刊论文 前4条
1 LI Wei;TAO Zhi;GU Dawu;SUN Li;QU Bo;LIU Zhiqiang;LIU Ya;;An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things[J];中国通信;2014年06期
2 张文英;刘枫;刘宣;孟帅;;Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32[J];Journal of Shanghai Jiaotong University(Science);2013年02期
3 张丽丽;张玉清;;基于分布式计算的RC4加密算法的暴力破解[J];计算机工程与科学;2008年07期
4 张丽丽;张玉清;;基于分布式计算的暴力破解分组密码算法[J];计算机工程;2008年13期
,本文编号:1575829
本文链接:https://www.wllwen.com/kejilunwen/wltx/1575829.html