对SHACAL-2算法和MD5加密模式的差分故障攻击
[Abstract]:Differential fault attack is an indirect attack method, which has a good effect on block cipher and stream cipher. Since Biham put forward the concept of differential fault attack in 1997, this method can be used to attack many cryptographic algorithms such as DES algorithm, elliptic curve cryptosystem / 3DES algorithm, SMS4 algorithm and CLEFIA algorithm. In this paper, the differential characteristics of nonlinear components in SHACAL-2 algorithm and MD5 encryption mode are studied by solving mixed equations. The differential characteristic is used to attack the differential fault. The main results are as follows: (1) it is proved that the solution of the difference equation is obtained when the input difference of the first position of the SHACAL-2 algorithm is nonzero or the first two positions of the selection function are not 00:00 (all the other positions are zero). The number of the input difference is only related to the weight of the input difference. Applying this result to the differential fault attack of SHACAL-2 algorithm, the effective differential fault location is explained as E, and it is proved that at least 160 random faults are needed to recover the 512-bit seed key with more than 60% success probability. At least 240 random faults are needed to recover the 512-bit seed key with a success probability of more than 98%. (2) by studying the differential characteristics of the wheel function in the MD5 encryption mode, a fast algorithm for solving the difference equation bit by bit is presented. Using this algorithm, the differential fault attack on MD5 encryption mode can be realized from the reciprocal third round. The results show that if the fault is imported from the penultimate third round, only 56 faults on average, the 512-bit seed key can be successfully recovered, and if the fault is imported from the penultimate round, An average of 112 faults are required to successfully recover the 512 bit seed key. Therefore, compared with importing faults from the reciprocal second round, the imported faults from the reciprocal round can not only reduce the number of rounds of fault attack ahead of schedule, but also reduce the number of faults needed to restore the seed key by half.
【学位授予单位】:国防科学技术大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.1
【相似文献】
相关期刊论文 前10条
1 朱贤军;李敬兆;;无加密模式下对云数据的隐私保密[J];计算机技术与发展;2013年06期
2 张慧;郭翠芳;牛夏牧;吴春欢;;磁盘加密模式分析[J];计算机工程;2010年05期
3 翁哲;;基于密匙的数字电影加密模式的探讨[J];黑龙江科技信息;2009年09期
4 ;无线网络各类加密模式详解[J];计算机与网络;2011年23期
5 李民政;一个改进SSL加密模式的新方案[J];桂林电子工业学院学报;2005年05期
6 彭建新;杜威;王晓雷;;TrueCrypt加密模式及对应取证方法研究[J];广东公安科技;2011年04期
7 zyj;;手把手教你如何安全分享无线网络[J];网络与信息;2010年06期
8 刘青;卫宏儒;;对完整轮数ARIRANG加密模式的新的相关密钥矩形攻击[J];计算机科学;2013年08期
9 张大军;李运发;郑周;;云计算中数据资源的安全共享机制[J];信息网络安全;2012年08期
10 廖嘉;王立鹏;陈鲁生;;对OCB模式的冲突攻击[J];计算机工程与应用;2006年04期
相关会议论文 前2条
1 李华;周志逵;;多级数据库中的两阶段子密钥加密模式[A];第二十二届中国数据库学术会议论文集(技术报告篇)[C];2005年
2 张大军;李运发;郑周;;云计算中数据资源的安全共享机制[A];第27次全国计算机安全学术交流会论文集[C];2012年
相关硕士学位论文 前1条
1 沈璇;对SHACAL-2算法和MD5加密模式的差分故障攻击[D];国防科学技术大学;2014年
,本文编号:2141780
本文链接:https://www.wllwen.com/kejilunwen/wltx/2141780.html