计算机技术 |
|
|
|
|
SIMON系列轻量级分组密码故障立方攻击 |
马云飞1, 王韬1, 陈浩1, 张帆2, 楼潇轩2, 许鲁珉2, 杨文兵3 |
1. 军械工程学院 信息工程系, 河北 石家庄 050003;
2. 浙江大学 信息与电子工程学院, 浙江 杭州 310027;
3. 九八〇四厂军代室, 云南 曲靖 655000 |
|
Fault-cube attack on SIMON family of lightweight block ciphers |
MA Yun-fei1, WANG Tao1, CHEN Hao1, ZHANG Fan2, LOU Xiao-xuan2, XU Lu-min2, YANG Wen-bing3 |
1. Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China;
2. College of Information Science and Electrical Engineering, Zhejiang University, Hangzhou 310027, China;
3. The Nine Eight Zero Four Military Representative Office, Qujing 655000, China |
引用本文:
马云飞, 王韬, 陈浩, 张帆, 楼潇轩, 许鲁珉, 杨文兵. SIMON系列轻量级分组密码故障立方攻击[J]. 浙江大学学报(工学版), 2017, 51(9): 1770-1779.
MA Yun-fei, WANG Tao, CHEN Hao, ZHANG Fan, LOU Xiao-xuan, XU Lu-min, YANG Wen-bing. Fault-cube attack on SIMON family of lightweight block ciphers. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(9): 1770-1779.
链接本文:
http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2017.09.011
或
http://www.zjujournals.com/eng/CN/Y2017/V51/I9/1770
|
[1] BEAULIEU R, SHORS D, SMITH J, et al. The SIMON and speck families of lightweight block ciphers[EB/OL]. (2013-06-19)[2016-11-30]. http://eprint.iacr.org/2013/404.pdf.
[2] ALIZADEH J, BAGHERI N, GAURAVARAM P,et al. Linear cryptanalysis of round reduced SIMON[EB/OL]. (2014-10-16)[2016-11-30]. http://eprint.iacr.org/2013/663.pdf.
[3] KÖLBL S, LEANDER G, TIESSEN T. Observations on the SIMON block cipher family[C]//Proceedings of the 35th International Cryptology Conference. SantaBarbara:Springer, 2015:161-185.
[4] ALIZADEH J, ALKHZAIMI H A, AREF M R, et.al. Cryptanalysis of SIMON variants with connections[C]//Proceedings of the 10th workshop on RFID Security. Oxford:Springer, 2014:90-107.
[5] BIRYUKOV A, ROY A, VELICHKOV V. Differential analysis of block ciphers SIMON and SPECK[C]//Proceedings of the 21st International Workshop on Fast Software Encryption. London:Springer, 2015:546-570.
[6] ABED F, LIST E, LUCKS S, et al. Differential cryptanalysis of round-reduced simon and speck[C]//Proceedings of the 21st International Workshop on Fast Software Encryption. London:Springer, 2015:525-545.
[7] RADDUM H. Algebraic analysis of the simon blockcipher family[C]//Proceedings of the Fourth International Conference on Cryptology and Information Security in Latin America. Guadalajara:Springer, 2015:157-169.
[8] RABBANINEJAD R, AHMADIAN Z, SALMASIZADEH M, et al. Cube and dynamic cube attacks on SIMON32/64[C]//Proceedings of the 11th International ISC Conference on Information Security and Cryptology. Piscataway:IEEE, 2014:98-103.
[9] TUPSAMUDRE H, BISHT S, MUKHOPADHYAY D. Differential fault analysis on the families of SIMON and SPECK ciphers[EB/OL]. (2014-05-30)[2016-11-30]. http://eprint.iacr.org/2014/267.pdf.
[10] YANG L, WANG M Q, QIAO S Y. Side channel cube attack on PRESENT[C]//Proceedings of the International Conference on Cryptology and Network Security. Kanazawa:Springer, 2009:379-391.
[11] ABDUL-LATIP S F, REYHANITABAR M R, SUSILO W, et al. On the security of NOEKEON against side channel cube attacks[C]//Proceedings of the 6th Information Security Practice and Experience Conference. Seoul:Springer, 2010:45-55.
[12] 赵新杰,郭世泽,王韬,等.EPCBC密码旁路立方体攻击[J].成都信息工程学院学报,2012, 27(6):525-530. ZHAO Xin-jie, GUO Shi-ze, WANG Tao, et al. Side-channel cube attacks on EPCBC[J]. Journal of Chengdu University of Information Technology, 2012, 27(6):525-530.
[13] LI Z Q, ZHANG B, YAO Y, et al. Cube cryptanalysis of LBlock with noisy leakage[C]//Proceedings of the 15th Annual International Conference on Information Security and Cryptology. Seoul:Springer, 2013:141-155.
[14] 曾文.Trivium算法的Fault Cube攻击与可滑动对研究[D].郑州:信息工程大学,2011. ZENG Wen. The fault cube attack and slid pairs research on trivium[D]. Zhengzhou:Information Engineering University, 2011.
[15] ABDUL-LATIP S F, REYHANITABAR M R, SUSILO W, et al. Fault analysis of the KATAN family of block ciphers[C]//Proceedings of the 8th Information Security Practice and Experience Conference. Hangzhou:Springer, 2012:319-336.
[16] DINUR I, SHAMIR A. Cube attacks on tweakable black box polynomials[C]//Proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cologne:Springer, 2009:278-299.
[17] 郭世泽,王韬,赵新杰.密码旁路分析原理与方法[M].北京:科学出版社,2014:248-277.
[18] BONEH D, DEMILLO R A, LIPTON R J. On the Importance of checking cryptographic protocols for faults[C]//Proceedings of the 15th Annual EUROCRYPT Conference on the Theory and Applications of Cryptologic Techniques. Konstanz:Springer, 1997:37-51.
[19] BIHAM E, SHAMIR A. Differential fault analysis of secret key cryptosystems[C]//Proceedings of the 17th Annual International Cryptology Conference. Santa Barbara, US:Springer, 1997:513-525.
[20] 马克裘依,腾斯托尔.密码故障分析与防护[M].赵新杰,郭世泽,张帆,等,译.北京:科学出版社,2015:240-245. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|