天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁(yè) > 科技論文 > 信息工程論文 >

若干對(duì)稱(chēng)密碼算法的安全性分析

發(fā)布時(shí)間:2019-05-12 14:36
【摘要】:在信息技術(shù)日新月異的互聯(lián)網(wǎng)時(shí)代,信息安全問(wèn)題變得日益突出。作為信息安全的理論核心,密碼學(xué)為數(shù)據(jù)的安全傳送提供基本保障。現(xiàn)代密碼學(xué)的密碼體制通常分為兩類(lèi):對(duì)稱(chēng)密碼體制和非對(duì)稱(chēng)密碼體制,其中對(duì)稱(chēng)密碼是密碼學(xué)研究的核心內(nèi)容之一。對(duì)稱(chēng)密碼主要包括分組密碼、Hash函數(shù)和流密碼,并且對(duì)稱(chēng)密碼算法具有運(yùn)行速度快,存儲(chǔ)量小以及易于軟硬件實(shí)現(xiàn)等優(yōu)點(diǎn)。分組密碼作為對(duì)稱(chēng)密碼的重要分支,廣泛地應(yīng)用于許多領(lǐng)域,,如文件傳輸、網(wǎng)絡(luò)通信和數(shù)據(jù)庫(kù)系統(tǒng)安全等。Hash函數(shù)作為對(duì)稱(chēng)密碼的另一個(gè)重要組成部分,在數(shù)字簽名、文件完整性和身份認(rèn)證等領(lǐng)域有著廣泛的應(yīng)用。 隨著智能硬件和嵌入式技術(shù)的飛速發(fā)展,以及密碼設(shè)備的大規(guī)模應(yīng)用,從密碼算法的數(shù)學(xué)結(jié)構(gòu)上研究算法的安全性已經(jīng)遠(yuǎn)遠(yuǎn)不夠,而需從密碼算法的具體實(shí)現(xiàn)分析算法的安全性。在這種背景下側(cè)信道攻擊應(yīng)運(yùn)而生,它利用密碼設(shè)備計(jì)算過(guò)程中出現(xiàn)的軟、硬件故障信息及相關(guān)輸出可快速地恢復(fù)出密鑰或者明文。差分故障攻擊作為一種有效的側(cè)信道攻擊,是指通過(guò)對(duì)密碼設(shè)備誘導(dǎo)故障并結(jié)合差分分析技術(shù)的密碼分析方法。差分故障攻擊憑借其攻擊能力強(qiáng),速度快且易實(shí)現(xiàn)等特點(diǎn),已引起國(guó)內(nèi)外研究學(xué)者的廣泛關(guān)注。 本文主要針對(duì)Serpent算法、GOST算法和MD5算法壓縮函數(shù)提出了有效的差分故障攻擊方法,并進(jìn)行了軟件模擬。同時(shí),本文也針對(duì)MD4算法提出了有效的故障檢測(cè)方法。本文的創(chuàng)新性研究成果有: 首先,在面向單字節(jié)的隨機(jī)故障模型和差分技術(shù)的基礎(chǔ)上,提出了針對(duì)Serpent密碼的有效差分故障攻擊方法。數(shù)學(xué)分析和實(shí)驗(yàn)結(jié)果表明僅需要48個(gè)故障密文即可恢復(fù)Serpent密碼的128位原始密鑰。該方法也為同類(lèi)型的其他迭代密碼的差分故障攻擊提供了一種較通用的分析手段。 其次,依據(jù)面向單字節(jié)的隨機(jī)故障模型和差分技術(shù),提出了對(duì)GOST密碼的差分故障攻擊方法。實(shí)驗(yàn)結(jié)果表明僅需要32個(gè)故障密文即可恢復(fù)GOST密碼的256比特原始密鑰。本文提出的方法不僅擴(kuò)大了故障攻擊的范圍,而且還提高了故障導(dǎo)入效率,降低了所需的故障密文數(shù)。 然后,根據(jù)面向字的隨機(jī)故障模型和差分技術(shù),提出了對(duì)MD5算法壓縮函數(shù)的差分故障攻擊方法。實(shí)驗(yàn)結(jié)果表明僅需要導(dǎo)入144個(gè)故障即可恢復(fù)出MD5算法的當(dāng)前輸入消息塊。該方法也為其它類(lèi)似MD5結(jié)構(gòu)的Hash函數(shù)的安全性分析提供了新的分析手段。 最后,依據(jù)差分故障攻擊原理,提出了MD4算法抵御差分故障攻擊的檢測(cè)方法。通過(guò)該檢測(cè)方法可以判斷當(dāng)前的MD4算法是否受到差分故障攻擊,并確定故障導(dǎo)入位置,以及分辨導(dǎo)入的故障是否為有效故障。該檢測(cè)方法對(duì)于其他的密碼算法抵御差分故障攻擊的研究具有重要的參考價(jià)值。
[Abstract]:In the Internet era with the rapid development of information technology, the problem of information security has become increasingly prominent. As the theoretical core of information security, cryptography provides the basic guarantee for the secure transmission of data. The cryptography of modern cryptography is usually divided into two categories: symmetric cryptography and asymmetric cryptography, in which symmetric cryptography is one of the core contents of cryptography research. Symmetric ciphers mainly include block ciphers, Hash functions and stream ciphers, and symmetric cryptography algorithms have the advantages of fast running speed, small storage and easy implementation of software and hardware. Block cipher, as an important branch of symmetric cipher, is widely used in many fields, such as file transfer, network communication and database system security. Hash function, as another important part of symmetric cipher, is used in digital signature. File integrity and identity authentication have a wide range of applications. With the rapid development of intelligent hardware and embedded technology, as well as the large-scale application of cryptography devices, it is far from enough to study the security of the algorithm from the mathematical structure of the cryptography algorithm. It is necessary to analyze the security of the algorithm from the specific implementation of the cryptography algorithm. In this context, the side channel attack emerges as the times require, which can quickly recover the key or clear text by using the software and hardware fault information and related output in the process of cryptography computing. As an effective side channel attack, differential fault attack refers to the cryptanalysis method which leads to the fault of cryptography equipment and combines the differential analysis technology. Differential fault attack has attracted extensive attention of scholars at home and abroad because of its strong attack ability, fast speed and easy implementation. In this paper, an effective differential fault attack method is proposed for Serpent algorithm, GOST algorithm and MD5 algorithm compression function, and the software simulation is carried out. At the same time, an effective fault detection method for MD4 algorithm is proposed in this paper. The innovative research results of this paper are as follows: firstly, based on the single byte-oriented stochastic fault model and differential technique, an effective differential fault attack method for Serpent cryptography is proposed. The mathematical analysis and experimental results show that only 48 fault ciphers are needed to recover the 128bit original key of Serpent password. This method also provides a general analysis method for differential fault attacks of other iterative ciphers of the same type. Secondly, based on the single byte-oriented stochastic fault model and differential technique, a differential fault attack method for GOST cryptography is proposed. The experimental results show that only 32 fault ciphertext is needed to recover the 256bit original key of the GOST password. The method proposed in this paper not only expands the scope of fault attack, but also improves the efficiency of fault import and reduces the number of fault ciphertext required. Then, according to the word-oriented stochastic fault model and differential technique, a differential fault attack method for compression function of MD5 algorithm is proposed. The experimental results show that only 144 faults can be imported to recover the current input message block of MD5 algorithm. This method also provides a new method for the security analysis of other Hash functions similar to MD5 structure. Finally, according to the principle of differential fault attack, a detection method of MD4 algorithm against differential fault attack is proposed. The detection method can be used to determine whether the current MD4 algorithm is attacked by differential fault, and to determine the location of fault import, and to distinguish whether the imported fault is an effective fault or not. This detection method has important reference value for other cryptography algorithms to resist differential fault attacks.
【學(xué)位授予單位】:東華大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2015
【分類(lèi)號(hào)】:TP309

【參考文獻(xiàn)】

相關(guān)期刊論文 前3條

1 張蕾;吳文玲;;SMS4密碼算法的差分故障攻擊[J];計(jì)算機(jī)學(xué)報(bào);2006年09期

2 李瑋;谷大武;;基于密鑰編排故障的SMS4算法的差分故障分析[J];通信學(xué)報(bào);2008年10期

3 韓軍;曾曉洋;趙佳;;抗差分功耗分析和差分故障分析的AES算法VLSI設(shè)計(jì)與實(shí)現(xiàn)[J];通信學(xué)報(bào);2010年01期



本文編號(hào):2475460

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2475460.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶(hù)596c7***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com
日本丁香婷婷欧美激情| 日韩精品中文字幕亚洲| 国产成人精品资源在线观看| 熟女乱一区二区三区丝袜| 欧美不卡高清一区二区三区| 在线免费观看一二区视频| 不卡在线播放一区二区三区| 中文字幕中文字幕一区二区| 精品欧美国产一二三区| 日韩精品视频免费观看| 亚洲美女国产精品久久| 色婷婷成人精品综合一区| 亚洲永久一区二区三区在线| 国产亚洲午夜高清国产拍精品| 精品亚洲av一区二区三区| 欧美国产日本高清在线| 激情中文字幕在线观看 | 国产一区二区不卡在线播放| 大尺度剧情国产在线视频| 大香蕉网国产在线观看av| 免费在线播放不卡视频| 黄色污污在线免费观看| 国产精品视频第一第二区| 成人午夜激情在线免费观看| 91欧美亚洲精品在线观看| 激情综合五月开心久久| 好东西一起分享老鸭窝| 中文字幕高清免费日韩视频| 日韩精品一区二区三区av在线| 精品老司机视频在线观看| 日韩精品日韩激情日韩综合| 黄色日韩欧美在线观看| 亚洲黄片在线免费小视频| 91后入中出内射在线| 亚洲日本中文字幕视频在线观看| 国产精品欧美一区二区三区| 国产日韩久久精品一区| 亚洲欧美精品伊人久久| 国产又粗又黄又爽又硬的| 欧美精品亚洲精品一区| 欧美日韩三区在线观看|