• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2011, Vol. 33 ›› Issue (10): 39-44.

• 论文 • 上一篇    下一篇

PRESENT的多模型差分错误分析

唐〓明1,2,沈〓菲2,邓〓慧2,尹〓鹏2,邱镇龙2,马〓啸2,张焕国1,2   

  1. (1.武汉大学信息安全与可信计算机教育部重点实验室,湖北 武汉 430072;2.武汉大学计算机学院,湖北 武汉 430072)
  • 收稿日期:2011-05-15 修回日期:2011-07-20 出版日期:2011-10-25 发布日期:2011-10-25
  • 作者简介:唐明(1976),女,湖北武汉人,博士,副教授,研究方向为密码学、密码芯片、侧信道分析与对抗。

A Multimodel Differential Fault Analysis on PRESENT

TANG Ming1,2,SHEN Fei2,DENG Hui2,YIN Peng2,QIU Zhenlong2,MA Xiao2,ZHANG Huanguo1,2   

  1. (1.State Key Laboratory of AIS and TC,Ministry of Education,Wuhan University,Wuhan  430072;2.School of Computer Science,Wuhan University,Wuhan 430072,China)
  • Received:2011-05-15 Revised:2011-07-20 Online:2011-10-25 Published:2011-10-25

摘要:

分错误分析方法进行研究,提出了针对PRESENT密码的四种差分错误模型,并对它们进行分析对比,从而找到针对PRESENT算法最好的差分错误分析方法。就我们收集到的现有发表著作显示,此次研究比以往PRESENT的差分错误攻击更为有效。最好结果是,在第28轮和第29轮P置换之间引入8bit随机错误,平均使用17个错误样本分析得到最后一轮64bit白化密钥。

关键词: 密码分析, 差分错误分析, 轻量密码, PRESENT密码

Abstract:

PRESENT is an ultralightweight block cipher which is suitable for lightweight hardware such as the RFID tags and sensor networks. In this paper, the strength of PRESENT against the differential fault analysis is explored. We present four kinds of fault models of differential fault analysis on PRESENT. Comparing these methods, we come up with the best method to analyse PRESENT using differential fault analysis. Up to now, our method is proved to be more efficient than the existing differential fault analysis on DFA in the published papers. The best result is, by introducing a 8 bit random error between the 28th round permutation and the 29th round permutation, we can recover a 64 bit postwhitening key on an average of 17 fault samples.

Key words: cryptanalysis;differential fault analysis;lightweight cipher;PRESENT