對SHACAL-2算法和MD5加密模式的差分故障攻擊
[Abstract]:Differential fault attack is an indirect attack method, which has a good effect on block cipher and stream cipher. Since Biham put forward the concept of differential fault attack in 1997, this method can be used to attack many cryptographic algorithms such as DES algorithm, elliptic curve cryptosystem / 3DES algorithm, SMS4 algorithm and CLEFIA algorithm. In this paper, the differential characteristics of nonlinear components in SHACAL-2 algorithm and MD5 encryption mode are studied by solving mixed equations. The differential characteristic is used to attack the differential fault. The main results are as follows: (1) it is proved that the solution of the difference equation is obtained when the input difference of the first position of the SHACAL-2 algorithm is nonzero or the first two positions of the selection function are not 00:00 (all the other positions are zero). The number of the input difference is only related to the weight of the input difference. Applying this result to the differential fault attack of SHACAL-2 algorithm, the effective differential fault location is explained as E, and it is proved that at least 160 random faults are needed to recover the 512-bit seed key with more than 60% success probability. At least 240 random faults are needed to recover the 512-bit seed key with a success probability of more than 98%. (2) by studying the differential characteristics of the wheel function in the MD5 encryption mode, a fast algorithm for solving the difference equation bit by bit is presented. Using this algorithm, the differential fault attack on MD5 encryption mode can be realized from the reciprocal third round. The results show that if the fault is imported from the penultimate third round, only 56 faults on average, the 512-bit seed key can be successfully recovered, and if the fault is imported from the penultimate round, An average of 112 faults are required to successfully recover the 512 bit seed key. Therefore, compared with importing faults from the reciprocal second round, the imported faults from the reciprocal round can not only reduce the number of rounds of fault attack ahead of schedule, but also reduce the number of faults needed to restore the seed key by half.
【學位授予單位】:國防科學技術大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TN918.1
【相似文獻】
相關期刊論文 前10條
1 朱賢軍;李敬兆;;無加密模式下對云數(shù)據(jù)的隱私保密[J];計算機技術與發(fā)展;2013年06期
2 張慧;郭翠芳;牛夏牧;吳春歡;;磁盤加密模式分析[J];計算機工程;2010年05期
3 翁哲;;基于密匙的數(shù)字電影加密模式的探討[J];黑龍江科技信息;2009年09期
4 ;無線網(wǎng)絡各類加密模式詳解[J];計算機與網(wǎng)絡;2011年23期
5 李民政;一個改進SSL加密模式的新方案[J];桂林電子工業(yè)學院學報;2005年05期
6 彭建新;杜威;王曉雷;;TrueCrypt加密模式及對應取證方法研究[J];廣東公安科技;2011年04期
7 zyj;;手把手教你如何安全分享無線網(wǎng)絡[J];網(wǎng)絡與信息;2010年06期
8 劉青;衛(wèi)宏儒;;對完整輪數(shù)ARIRANG加密模式的新的相關密鑰矩形攻擊[J];計算機科學;2013年08期
9 張大軍;李運發(fā);鄭周;;云計算中數(shù)據(jù)資源的安全共享機制[J];信息網(wǎng)絡安全;2012年08期
10 廖嘉;王立鵬;陳魯生;;對OCB模式的沖突攻擊[J];計算機工程與應用;2006年04期
相關會議論文 前2條
1 李華;周志逵;;多級數(shù)據(jù)庫中的兩階段子密鑰加密模式[A];第二十二屆中國數(shù)據(jù)庫學術會議論文集(技術報告篇)[C];2005年
2 張大軍;李運發(fā);鄭周;;云計算中數(shù)據(jù)資源的安全共享機制[A];第27次全國計算機安全學術交流會論文集[C];2012年
相關碩士學位論文 前1條
1 沈璇;對SHACAL-2算法和MD5加密模式的差分故障攻擊[D];國防科學技術大學;2014年
,本文編號:2141780
本文鏈接:http://sikaile.net/kejilunwen/wltx/2141780.html