Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2010, Vol. 36 ›› Issue (19): 156-158. doi: 10.3969/j.issn.1000-3428.2010.19.054

• Networks and Communications • Previous Articles     Next Articles

Multiple Bytes Differential Fault Analysis on CLEFIA

GAO Jing-zhe, ZHAO Xin-jie, JIAO Wen-cheng, TIAN Jun-jian   

  1. (Dept. of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003, China)
  • Online:2010-10-05 Published:2010-09-27

针对CLEFIA的多字节差分故障分析

高靖哲,赵新杰,矫文成,田军舰   

  1. (军械工程学院计算机工程系,石家庄 050003)
  • 作者简介:高靖哲(1984-),男,硕士研究生,主研方向:对称密码故障分析;赵新杰,博士研究生;矫文成,副教授;田军舰,硕士研究生
  • 基金资助:
    国家自然科学基金资助项目(60772082);河北省自然科学基金数学研究专项基金资助项目(08M010)

Abstract: This paper examines the strength of CLEFIA block cipher against multiple bytes differential fault attack. It presents a principle of CLEFIA and differential fault analysis. According to inject faults into the rth, r-1th, r-2th round three conditions, it proposes a new fault analysis method on CLEFIA based on multiple bytes fault model, and verifies it through software simulation. Experimental result demonstrates that due to its Feistel structure and S-box feature, CLEFIA is vulnerable to multiple bytes fault attack, 6~8 faulty ciphertexts are needed to recover full 128 bit key.

Key words: block cipher, CLEFIA cipher, Feistel structure, multiple bytes faults, differential fault analysis

摘要: 研究CLEFIA分组密码对多字节差分故障分析的安全性,给出CLEFIA分组密码算法及故障分析原理。根据在第r轮、r-1轮、 r-2轮注入多字节故障的3种条件,提出一种新的针对CLEFIA的多字节故障模型及分析方法。通过仿真实验进行验证,结果表明,由于其Feistel结构和S盒特性,CLEFIA易遭受多字节故障攻击,6~8个错误密文可恢复128 bit的CLEFIA密钥。

关键词: 分组密码, CLEFIA密码, Feistel结构, 多字节故障, 差分故障分析

CLC Number: