天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

MICKEY的差分錯誤攻擊的研究

發(fā)布時間:2018-03-06 17:41

  本文選題:差分錯誤攻擊 切入點:MICKEY-128 出處:《西安電子科技大學(xué)》2015年碩士論文 論文類型:學(xué)位論文


【摘要】:隨著信息時代的來臨,人們對信息的安全越來越重視,各種保護(hù)信息安全的密碼算法被提出。為了證明這些算法的安全性,就需要不斷的用各種分析方法對其進(jìn)行分析。然而傳統(tǒng)的分析方法,例如窮舉法攻擊,代數(shù)攻擊,差分攻擊只能證明算法理論上的安全性,無法證明算法在硬件設(shè)備上實現(xiàn)后的安全性。差分錯誤攻擊方法的提出彌補(bǔ)了這方面的空白,通過采集硬件設(shè)備泄露的信息,能夠?qū)λ惴ㄔ谠O(shè)備中實現(xiàn)后的安全性進(jìn)行分析。差分錯誤攻擊的提出不但為密碼分析者提供了新的分析方法,還為密碼學(xué)的研究打開了新的方向。目前對于差分錯誤攻擊方法的研究方向主要在于如何以較小的代價正確快速的恢復(fù)出密鑰。本文的一個工作就是對基于MICKEY-128 2.0的差分錯誤攻擊的改進(jìn),提高了算法工作效率。同時據(jù)所查資料顯示,在對MICKEY-128 2.0的差分錯誤攻擊的實現(xiàn)方面的研究中,對于并行化技術(shù)和分布式計算的引入還是一個空白。本文的另外一個工作就是把這兩項內(nèi)容引入到差分錯誤攻擊的實現(xiàn)中,提高攻擊的速度。本文主要的工作內(nèi)容包括以下兩方面:1、對Sandip Karmakar和Dipanwita Roy Chowdhury提出的基于MICKEY-128 2.0的差分錯誤攻擊方法提出了改進(jìn)。2013年,Sandip Karmakar和Dipanwita Roy Chowdhury對MICKEY-128 2.0給出了一個差分錯誤攻擊方法,利用方法使用480個錯誤插入和480對正確/錯誤密鑰流即可成功恢復(fù)寄存器的初始狀態(tài)。從錯誤插入個數(shù)的角度來講,該方法是當(dāng)時性能最佳的方法。然而在本文中我們指出該方法依然存在不足之處,并且給出了改善的方案,最終得到了改善后的差分錯誤攻擊方法。改進(jìn)之后的算法在不影響原有算法性能的前提下彌補(bǔ)了它的不足之處,并且適用于其他版本的Mickey密碼。2、從工程實現(xiàn)的角度對本文提出的差分錯誤攻擊做了改進(jìn)。在工程實現(xiàn)中,差分錯誤攻擊需要采集大量的數(shù)據(jù)進(jìn)行分析,試錯。當(dāng)數(shù)據(jù)量過大時,用傳統(tǒng)的單一計算機(jī),單線程進(jìn)行計算將會降低工作效率。為了提高實際操作的效率,本文融入并行化技術(shù),分布式計算等概念,讓多個計算機(jī),多條線程同時運行,從而提高速度,縮短破譯密鑰的時間。在擁有兩臺運算節(jié)點,每個節(jié)點配備二核處理器的條件下,引入并行化技術(shù)和分布式計算后差分錯誤攻擊的速度將接近原來的3.6倍。
[Abstract]:With the advent of the information age, people pay more and more attention to the security of information, and a variety of cryptographic algorithms are proposed to protect the security of information. However, traditional analysis methods, such as exhaustive attack, algebraic attack and differential attack, can only prove the theoretical security of the algorithm. It is impossible to prove the security of the algorithm after it is implemented on the hardware device. The differential error attack method has made up the blank in this respect, and the information leaked by the hardware device is collected. It can analyze the security of the algorithm after it is implemented in the device. The differential error attack not only provides a new analysis method for cryptographers, but also provides a new analysis method for cryptographers. It also opens a new direction for the research of cryptography. At present, the main research direction of differential error attack is how to recover the key correctly and quickly at a lower cost. One of the work of this paper is to study the problem based on MICKEY-128 2. 0. Improved differential error attack, The efficiency of the algorithm is improved. According to the data collected, the research on the implementation of differential error attack for MICKEY-128 2.0, The introduction of parallelization and distributed computing is still a blank. Another work of this paper is to introduce these two items into the implementation of differential error attack. The main work of this paper includes the following two aspects: 1. This paper proposes an improvement to the differential error attack method based on MICKEY-128 2.0 proposed by Sandip Karmakar and Dipanwita Roy Chowdhury. In 2013, the Sandip Karmakar and Dipanwita Roy Chowdhury gave a difference to MICKEY-128 2.0. Split error attack method, Using the method 480 error inserts and 480 pairs of correct / error key streams are used to successfully restore the initial state of registers. This method is the best method at that time. However, in this paper, we point out that the method still has some shortcomings, and give an improved scheme. Finally, the improved differential error attack method is obtained. The improved algorithm makes up for its shortcomings without affecting the performance of the original algorithm. And it is suitable for other versions of Mickey password. 2. The differential error attack proposed in this paper is improved from the point of view of engineering implementation. In the engineering implementation, the differential error attack needs to collect a lot of data for analysis, trial and error. When the amount of data is too large, In order to improve the efficiency of practical operation, this paper integrates the concepts of parallelization, distributed computing, and so on, so that multiple computers and multiple threads can run at the same time. Under the condition of having two operation nodes and each node equipped with two core processors, the speed of differential error attack after introducing parallelization and distributed computing will be nearly 3.6 times as fast as the original one.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2015
【分類號】:TN918.1

【參考文獻(xiàn)】

相關(guān)期刊論文 前4條

1 LI Wei;TAO Zhi;GU Dawu;SUN Li;QU Bo;LIU Zhiqiang;LIU Ya;;An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things[J];中國通信;2014年06期

2 張文英;劉楓;劉宣;孟帥;;Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32[J];Journal of Shanghai Jiaotong University(Science);2013年02期

3 張麗麗;張玉清;;基于分布式計算的RC4加密算法的暴力破解[J];計算機(jī)工程與科學(xué);2008年07期

4 張麗麗;張玉清;;基于分布式計算的暴力破解分組密碼算法[J];計算機(jī)工程;2008年13期



本文編號:1575829

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/1575829.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶74720***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com
真实偷拍一区二区免费视频| 欧美午夜视频免费观看| 中文字幕佐山爱一区二区免费| 日韩性生活视频免费在线观看 | 亚洲一级二级三级精品| 国产精品欧美激情在线播放| 亚洲二区欧美一区二区| 日韩aa一区二区三区| 欧美日韩少妇精品专区性色| 日韩欧美一区二区久久婷婷| 邻居人妻人公侵犯人妻视频| 日韩人妻少妇一区二区| 自拍偷拍一区二区三区| 香蕉尹人视频在线精品| 91欧美日韩国产在线观看| 欧美日韩亚洲国产精品| 欧美一区二区三区高潮菊竹| 日韩熟妇人妻一区二区三区| 国产欧美精品对白性色| 丁香七月啪啪激情综合| 在线免费视频你懂的观看| 精品人妻精品一区二区三区| 冬爱琴音一区二区中文字幕| 99香蕉精品视频国产版| 91福利视频日本免费看看| 亚洲国产中文字幕在线观看| 大伊香蕉一区二区三区| 99热中文字幕在线精品| 大香蕉久久精品一区二区字幕| 国产日产欧美精品视频| 在线观看欧美视频一区| 人妻露脸一区二区三区| 亚洲国产精品久久网午夜| 久久精品中文字幕人妻中文| 国产免费黄片一区二区| 日韩在线视频精品中文字幕| 中文字幕乱码免费人妻av| 深夜福利亚洲高清性感| 免费观看日韩一级黄色大片| 国产成人av在线免播放观看av| 国产精品香蕉一级免费|