Computer Science ›› 2015, Vol. 42 ›› Issue (Z11): 352-356.

Previous Articles     Next Articles

Differential Fault Attack and Analysis of Improvement on LEX

LI Jia-yu, SHI Hui, DENG Yuan-qing, GONG Jing and GUAN Yu   

  • Online:2018-11-14 Published:2018-11-14

Abstract: A method of differential fault attack on LEX was analyzed.In order to enhance the ability of stream cipher LEX to resist differential fault attack,based on the idea of making every RoundKey xor a 128-bit random stream,a new version of LEX was proposed.Then the safety and speed of the improved LEX algorithm were analyzed,and an exam-ple was performed to test the randomicity of the improved algorithm’s key stream.The results show that the improved algorithm is resistant to differential fault attack,and simultaneously,has the same computing speed and randomicity to the original LEX algorithm,which is an improvement of LEX.

Key words: Stream cipher,LEX,Security,Differential fault attack,Randomicity

[1] 刘依依.eSTREAM和流密码分析现状[J].信息安全与通信保密,2009,1(12):47-49
[2] Alex B.A new 128 bit key stream cipher LEX[EB/OL].[2005-06-13].http://www.ecrypt.eu.org/stream/ciphers/lex/lex.pdf
[3] National Institute of Standards and Technology(NIST).Announcing the Advanced Encryption Standard(AES) [EB/OL].(2001-11-26).http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
[4] 邓元庆,龚晶,石会.密码学简明教程[M].北京:清华大学出版社,2011:71-93
[5] Henricksen M.Flexible Block Ciphers:Modifying LEX[C]∥Proceedings of ICCSIT2010.Chengdu,2010
[6] Boneh D,DeMillo R A,Lipton R J.On the importance of checking cryptographic protocols for faults[M]∥Advances in Cryptology-EUROCRYPT’97.1997:37-51
[7] Biham E,Shamir A.Differential fault analysis of secret keycryptosystems[M]∥Advances in Crytpology-CRYPTO’97.1997:37-51
[8] Huang J,Susilo W,Seberry J.Differential fault analysis of LEX[C]∥ Proceedings of SCN 2010.Amalfi,Italy,2010
[9] Skorobogatov S,Anderson R.Optical fault induction attacks[M]∥Cryptographic Hardware and Embedded System-CHES 2002.2003:2-12
[10] Giraud C.DFA on AES[M]∥ Advanced Encryption Stardard-AES.2005:27-41
[11] 张中亚,关杰.对流密码算法LEX的差分故障攻击[J].上海交通大学学报,2012,0(6):865-869
[12] 王秋燕,金晨辉.LEX算法的输出位置分析[J].计算机应用与软件,2014,1(10):309-313
[13] 随机性检测规范:GM/T 0005-2012[S].北京:中国标准出版社,2012

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!