MICKEY的差分錯誤攻擊的研究
發(fā)布時間:2018-03-06 17:41
本文選題:差分錯誤攻擊 切入點:MICKEY-128 出處:《西安電子科技大學(xué)》2015年碩士論文 論文類型:學(xué)位論文
【摘要】:隨著信息時代的來臨,人們對信息的安全越來越重視,各種保護(hù)信息安全的密碼算法被提出。為了證明這些算法的安全性,就需要不斷的用各種分析方法對其進(jìn)行分析。然而傳統(tǒng)的分析方法,例如窮舉法攻擊,代數(shù)攻擊,差分攻擊只能證明算法理論上的安全性,無法證明算法在硬件設(shè)備上實現(xiàn)后的安全性。差分錯誤攻擊方法的提出彌補(bǔ)了這方面的空白,通過采集硬件設(shè)備泄露的信息,能夠?qū)λ惴ㄔ谠O(shè)備中實現(xiàn)后的安全性進(jìn)行分析。差分錯誤攻擊的提出不但為密碼分析者提供了新的分析方法,還為密碼學(xué)的研究打開了新的方向。目前對于差分錯誤攻擊方法的研究方向主要在于如何以較小的代價正確快速的恢復(fù)出密鑰。本文的一個工作就是對基于MICKEY-128 2.0的差分錯誤攻擊的改進(jìn),提高了算法工作效率。同時據(jù)所查資料顯示,在對MICKEY-128 2.0的差分錯誤攻擊的實現(xiàn)方面的研究中,對于并行化技術(shù)和分布式計算的引入還是一個空白。本文的另外一個工作就是把這兩項內(nèi)容引入到差分錯誤攻擊的實現(xiàn)中,提高攻擊的速度。本文主要的工作內(nèi)容包括以下兩方面:1、對Sandip Karmakar和Dipanwita Roy Chowdhury提出的基于MICKEY-128 2.0的差分錯誤攻擊方法提出了改進(jìn)。2013年,Sandip Karmakar和Dipanwita Roy Chowdhury對MICKEY-128 2.0給出了一個差分錯誤攻擊方法,利用方法使用480個錯誤插入和480對正確/錯誤密鑰流即可成功恢復(fù)寄存器的初始狀態(tài)。從錯誤插入個數(shù)的角度來講,該方法是當(dāng)時性能最佳的方法。然而在本文中我們指出該方法依然存在不足之處,并且給出了改善的方案,最終得到了改善后的差分錯誤攻擊方法。改進(jìn)之后的算法在不影響原有算法性能的前提下彌補(bǔ)了它的不足之處,并且適用于其他版本的Mickey密碼。2、從工程實現(xiàn)的角度對本文提出的差分錯誤攻擊做了改進(jìn)。在工程實現(xiàn)中,差分錯誤攻擊需要采集大量的數(shù)據(jù)進(jìn)行分析,試錯。當(dāng)數(shù)據(jù)量過大時,用傳統(tǒng)的單一計算機(jī),單線程進(jìn)行計算將會降低工作效率。為了提高實際操作的效率,本文融入并行化技術(shù),分布式計算等概念,讓多個計算機(jī),多條線程同時運行,從而提高速度,縮短破譯密鑰的時間。在擁有兩臺運算節(jié)點,每個節(jié)點配備二核處理器的條件下,引入并行化技術(shù)和分布式計算后差分錯誤攻擊的速度將接近原來的3.6倍。
[Abstract]:With the advent of the information age, people pay more and more attention to the security of information, and a variety of cryptographic algorithms are proposed to protect the security of information. However, traditional analysis methods, such as exhaustive attack, algebraic attack and differential attack, can only prove the theoretical security of the algorithm. It is impossible to prove the security of the algorithm after it is implemented on the hardware device. The differential error attack method has made up the blank in this respect, and the information leaked by the hardware device is collected. It can analyze the security of the algorithm after it is implemented in the device. The differential error attack not only provides a new analysis method for cryptographers, but also provides a new analysis method for cryptographers. It also opens a new direction for the research of cryptography. At present, the main research direction of differential error attack is how to recover the key correctly and quickly at a lower cost. One of the work of this paper is to study the problem based on MICKEY-128 2. 0. Improved differential error attack, The efficiency of the algorithm is improved. According to the data collected, the research on the implementation of differential error attack for MICKEY-128 2.0, The introduction of parallelization and distributed computing is still a blank. Another work of this paper is to introduce these two items into the implementation of differential error attack. The main work of this paper includes the following two aspects: 1. This paper proposes an improvement to the differential error attack method based on MICKEY-128 2.0 proposed by Sandip Karmakar and Dipanwita Roy Chowdhury. In 2013, the Sandip Karmakar and Dipanwita Roy Chowdhury gave a difference to MICKEY-128 2.0. Split error attack method, Using the method 480 error inserts and 480 pairs of correct / error key streams are used to successfully restore the initial state of registers. This method is the best method at that time. However, in this paper, we point out that the method still has some shortcomings, and give an improved scheme. Finally, the improved differential error attack method is obtained. The improved algorithm makes up for its shortcomings without affecting the performance of the original algorithm. And it is suitable for other versions of Mickey password. 2. The differential error attack proposed in this paper is improved from the point of view of engineering implementation. In the engineering implementation, the differential error attack needs to collect a lot of data for analysis, trial and error. When the amount of data is too large, In order to improve the efficiency of practical operation, this paper integrates the concepts of parallelization, distributed computing, and so on, so that multiple computers and multiple threads can run at the same time. Under the condition of having two operation nodes and each node equipped with two core processors, the speed of differential error attack after introducing parallelization and distributed computing will be nearly 3.6 times as fast as the original one.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2015
【分類號】:TN918.1
【參考文獻(xiàn)】
相關(guān)期刊論文 前4條
1 LI Wei;TAO Zhi;GU Dawu;SUN Li;QU Bo;LIU Zhiqiang;LIU Ya;;An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things[J];中國通信;2014年06期
2 張文英;劉楓;劉宣;孟帥;;Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32[J];Journal of Shanghai Jiaotong University(Science);2013年02期
3 張麗麗;張玉清;;基于分布式計算的RC4加密算法的暴力破解[J];計算機(jī)工程與科學(xué);2008年07期
4 張麗麗;張玉清;;基于分布式計算的暴力破解分組密碼算法[J];計算機(jī)工程;2008年13期
,本文編號:1575829
本文鏈接:http://sikaile.net/kejilunwen/wltx/1575829.html
最近更新
教材專著