计算机科学 ›› 2011, Vol. 38 ›› Issue (8): 80-82.

• 计算机网络与信息安全 • 上一篇    下一篇

一种针对Grain-v1的新差分错误攻击

王璐,胡予蹼,张振广   

  1. (西安电子科技大学计算机网络与信息安全教育部重点实验室 西安710071)
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(60833008)和国家973计划(2007CB311201)资助。

Differential Fault Analysis of Grain-v1

WANG Lu, HU Yu-pu , GHANG Zhen-guang   

  • Online:2018-11-16 Published:2018-11-16

摘要: 通过分析流密码算法Grain-vl,提出了一种针对密钥流生成器的差分错误攻击。该攻击利用了前17轮密钥流次数较低的弱点,向LFSR的指定位置引入错误,通过差分得到17个线性无关的线性方程和80个内部状态,只需要猜测62bits的初始内部状态变量就可得到密钥种子。整个过程的计算复杂度为O(2 74,26)。结果表明,Grain-vl抗差分错误攻击的计算复杂度低于设计者宣称的O(2 80),也就是说,算法存在安全漏洞。

关键词: 流密码,Grain,差分错误攻击,密钥流

Abstract: By analyzing the weakness in design of the stream cipher Grain-vl,a differential fault attack was presented.The attack makes use of the weakness that the key stream equations in the first 17 times have comparatively low orders. The attacker needs to inject faults to the specified positions of LFSR at the stage of generating key streamBy differentiating,the attacker is able to acquire 17 linear ectuations which are linear independent and 80 initial states of the stream cipher directly. The attacker just needs to guess 62bits internal states, and then all the internal state can be achieved. The proposed attack algorithm can reduce the complexity to O(2 74,26).The result shows that the analyzed algo- rithm has security vulnerabilities, and the computational complexity of attacks is lower than that the designers claimed O(2 80).

Key words: Stream cipher,Grain,Differential fault attack,Key stream

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!