作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (1): 189-190,. doi: 10.3969/j.issn.1000-3428.2010.01.065

• 安全技术 • 上一篇    下一篇

AES差分故障攻击的建模与分析

刘上力,赵劲强,聂勤务   

  1. (湖南科技大学网络信息中心,湘潭 411201)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2010-01-05 发布日期:2010-01-05

Modeling and Analysis of AES Differential Fault Attack

LIU Shang-li, ZHAO Jing-qiang, NIE Qin-wu   

  1. (Network and Information Center, Hunan University of Science and Technology, Xiangtan 411201)
  • Received:1900-01-01 Revised:1900-01-01 Online:2010-01-05 Published:2010-01-05

摘要: 研究高级加密标准(AES)密码算法对差分故障攻击的安全性。攻击采用针对密钥扩展算法的单字节随机故障模型,通过对比正确和错误密文的差异恢复种子密钥。该攻击方法理论上仅需104个错误密文和2个末轮子密钥字节的穷举搜索就可完全恢复AES的128比特种子密钥。故障位置的不均匀分布使实际攻击所需错误密文数与理论值略有不同。

关键词: 高级加密标准, 差分故障攻击, 故障诱导, 故障模型

Abstract: This paper examines the ability of Advanced Encryption Standard(AES) against the differential fault attack. It uses the byte-oriented fault model against AES key schedule, and compares the differences between correct and faulty secret information embedded in a system to retrieve seed key. Theoretically, the 128 bit master key for AES can be obtained by using 104 faulty ciphertexts and retrieving 2 bytes of tenth round keys by exhaustive search. For the fact that the byte position where the fault happens is not equally distributed, there is little differences between the theoretical value and the number of faulty ciphertexts needed in the attack experiment result.

Key words: Advanced Encryption Standard(AES), differential fault attack, fault inducing, fault model

中图分类号: