计算机科学 ›› 2011, Vol. 38 ›› Issue (8): 80-82.
• 计算机网络与信息安全 • 上一篇 下一篇
王璐,胡予蹼,张振广
出版日期:
发布日期:
基金资助:
WANG Lu, HU Yu-pu , GHANG Zhen-guang
Online:
Published:
摘要: 通过分析流密码算法Grain-vl,提出了一种针对密钥流生成器的差分错误攻击。该攻击利用了前17轮密钥流次数较低的弱点,向LFSR的指定位置引入错误,通过差分得到17个线性无关的线性方程和80个内部状态,只需要猜测62bits的初始内部状态变量就可得到密钥种子。整个过程的计算复杂度为O(2 74,26)。结果表明,Grain-vl抗差分错误攻击的计算复杂度低于设计者宣称的O(2 80),也就是说,算法存在安全漏洞。
关键词: 流密码,Grain,差分错误攻击,密钥流
Abstract: By analyzing the weakness in design of the stream cipher Grain-vl,a differential fault attack was presented.The attack makes use of the weakness that the key stream equations in the first 17 times have comparatively low orders. The attacker needs to inject faults to the specified positions of LFSR at the stage of generating key streamBy differentiating,the attacker is able to acquire 17 linear ectuations which are linear independent and 80 initial states of the stream cipher directly. The attacker just needs to guess 62bits internal states, and then all the internal state can be achieved. The proposed attack algorithm can reduce the complexity to O(2 74,26).The result shows that the analyzed algo- rithm has security vulnerabilities, and the computational complexity of attacks is lower than that the designers claimed O(2 80).
Key words: Stream cipher,Grain,Differential fault attack,Key stream
王璐,胡予蹼,张振广. 一种针对Grain-v1的新差分错误攻击[J]. 计算机科学, 2011, 38(8): 80-82. https://doi.org/
WANG Lu, HU Yu-pu , GHANG Zhen-guang. Differential Fault Analysis of Grain-v1[J]. Computer Science, 2011, 38(8): 80-82. https://doi.org/
0 / / 推荐
导出引用管理器 EndNote|Reference Manager|ProCite|BibTeX|RefWorks
链接本文: https://www.jsjkx.com/CN/
https://www.jsjkx.com/CN/Y2011/V38/I8/80
Cited