期刊文献+

Grain-v1的多比特差分故障攻击 被引量:2

Multi-Bit Differential Fault Analysis of Grain-v1
下载PDF
导出
摘要 本文研究Grain-v1的差分故障攻击.目前,很多文献在一个故障引起一个中间状态比特翻转的假设条件下,利用差分故障攻击对Grain系列算法进行了分析.然而,随着芯片尺寸的缩小以及复杂性的提升,一个故障精确地引起一个中间状态比特的翻转在技术上实现的难度越来越大.对于Grain-v1,目前并没有文献在一个故障引起多个中间状态比特翻转的假设条件下,给出一个有效的差分故障攻击.本文针对Grain-v1,在一个故障至多引发连续8比特翻转,翻转比特的位置可以是LFSR,或者NFSR,或者横跨LFSR和NFSR,并且具体翻转比特数量未知的条件下,给出了一个有效的差分故障攻击.特别地,文中利用在FSE 2013中提出的Grain-v1近似碰撞攻击的思想,给出了一个新的确定故障信息的方法,即故障实际引发的比特翻转位置和比特翻转数量.实验数据表明,已知160比特的差分序列,该方法能以大约97.5%的概率确定出故障信息.通过SAT求解器CryptoMiniSat2.9.6,在CPU频率为2.83GHz、4G系统内存的PC机上,利用大约8个故障,五十分钟左右可以恢复出Grain-v1的160比特中间状态.本文攻击思想也适用于Grain-128以及一个故障引发大于8比特翻转的情形. This paper studies differential fault attack against Grain-v1. Recently several differential fault attacks were reported on Grain family under the assumption that a single fault could flip a single bit of the internal state. However, as chip sizes shrink and the complexity of devices increases, one bit of internal state being flipped by a single fault with acceptable accuracy seems to be more and more difficult in practice. As for Grain-v1, no efficient multi-bit differential fault attack has been proposed yet. This paper presents a multi-bit differential attack against Grain-v1, under the assumption that a single fault could flip no more than 8 consecutive bits in the main register without knowing the specific location and the exact number of bits. Those flipped bits could be located at the LFSR, or at the NFSR, or even across the LFSR and the NFSR. In particular, inspired by the main idea of near collision attack against Grain-v1 proposed in FSE 2013, a new method of identifying a multi-bit fault is proposed, including the position and the number of the flipped bits. By this new method, using 160 differential key-stream bits, the corresponding fault information could be determined with a probability of 97.5%. By the SAT solver CryptoMiniSat2.9.6, on a computer with a 2.83GHz CPU and 4G RAM, the 160-bit internal state of Grain-v1 could be recovered within 50 minutes using about eight faults. The idea of the analysis in this paper could also be applied to Grain-128 and the case of more than 8 bits flipped by a single fault.
作者 叶晨东 田甜
出处 《密码学报》 CSCD 2016年第3期258-269,共12页 Journal of Cryptologic Research
基金 国家自然科学基金(61272042 61521003) 国家863重点项目(2015AA01A708)
关键词 序列密码 Grain-v1 差分故障攻击 stream ciphers Grain-v1 differential fault attack
  • 相关文献

参考文献18

  • 1Martin Hell,Thomas Johansson,Willi Meier.??Grain: a stream cipher for constrained environments(J)Int. J. of Wireless and Mobile Computing . 2007 (1)
  • 2DEY P,CHAKRABORTY A,ADHIKARI A,et al.Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions. IACR Cryptology eP rint Archive 2014/654 . 2014
  • 3SARKAR S,BANIK S,MAITRA S.Differential fault attack against grain family with very few faults and minimal assumptions. IACR Cryptology eP rint Archive2013/494 . 2013
  • 4ZHANG B,LI Z,FENG D,et al.Near collision attack on the grain v1 stream cipher. Fast Software Encryption . 2014
  • 5RAHIMI M,BARMSHORY M,MANSOURI M H,et al.Dynamic Cube Attack on Grain-v1. IACR Cryptology eP rint Archive 2013/268 . 2013
  • 6S. Skorobogatov,R. Anderson.Optical Fault Induction Attacks. Cryptographic Hardware and Embedded Systems - CHES 2002 . 2003
  • 7Bar-El, Hagai,Choukri, Hamid,Naccache, David,Tunstall, Michael,Whelan, Claire.The sorcerer’s apprentice guide to fault attacks. Proceedings of Tricomm . 2006
  • 8HELL M,JOHANSSON T,MAXIMOV A,et al.A streamcipher proposal Grain-128. IEEE InternationalSymposium on Information Theory . 2006
  • 9A.Berzati,,C.Canovas,,G.Castagnos,,B.Debraize,,L.Goubin,,A.Gouget,,P.Paillier,,S.Salgado.Fault Analysis of Grain-128. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009) . 2009
  • 10S. Knellwolf,W. Meier,M. Naya-Plasencia.Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. Advances in Cryptology-ASIACRYPT’’2010 . 2010

共引文献1

同被引文献4

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部