• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2011, Vol. 33 ›› Issue (3): 7-12.doi: 10.3969/j.issn.1007130X.2011.

• 论文 • 上一篇    下一篇

Salsa20的差分故障分

申延成1,谢端强1,李超1,2   

  1. (1.国防科学技术大学理学院,湖南 长沙 410073;2.中科院软件所信息安全国家重点实验室,北京 100190)
  • 收稿日期:2010-06-17 修回日期:2010-10-08 出版日期:2011-03-25 发布日期:2011-03-25
  • 作者简介:申延成(1987),男,河南新乡人,硕士生,研究方向为编码密码理论及其应用。谢端强(1963),男,湖南南县人,硕士,教授,研究方向为编码密码理论及其应用。李超(1966),男,湖南汨罗人,博士,教授,博士生导师,研究方向为编码密码理论及其应用。
  • 基金资助:

    国家自然科学基金资助项目(60803156);信息安全国家重点实验室开放基金资助课题(0107)

Differential Fault Analysis of Salsa20

SHEN Yancheng1,XIE Duanqiang1,LI Chao1,2   

  1. (1.School of Science,National University of Defense Technology,Changsha 410073;
    2.State Key Laboratory of Information Security,Institute of Software,
    Chinese Academy of Sciences,Beijing 100190,China)
  • Received:2010-06-17 Revised:2010-10-08 Online:2011-03-25 Published:2011-03-25

摘要:

Salsa20是eSTREAM计划最终获胜算法之一,其主要特征是利用模加、异或和循环移位三种运算的混合提供算法所需扩散性和混淆性。目前对该算法的分析主要集中在统计分析和差分分析两方面。本文研究Salsa20/256的差分故障分析,在基于随机字的故障诱导模型下,通过诱导96个错误,将以近似1的概率获得186比特的密钥信息,从而将恢复Salsa20/256全部密钥比特的时间复杂度降为270,这表明Salsa20/256对基于随机字的差分故障分析是脆弱的。

关键词: 流密码, Salsa20, 差分故障分析

Abstract:

Salsa20 is one of the finalists of the eSTREAM project. Its main feature is using the ARX operations (i.e. addition, rotation, and xor on 32bit words) to achieve good confusion and diffusion effects. At present, many cryptanalytic results on it are statistical cryptanalysis and differential cryptanalysis. In this paper, we further investigate a differential fault analysis of Salsa20/256. By adopting a random fault word model, when inducing 96 faults,the 186 bit key can be recovered with a probability close to 1,accordingly the complexity of recovering the full key bits of Salsa20/256 can be reduced to 270, which implies that Salsa20/256 is sensitive to the differential fault analasis.

Key words: stream cipher;Salsa20;differential fault analysis