欢迎访问中国科学院大学学报,今天是

中国科学院大学学报 ›› 2012, Vol. ›› Issue (2): 271-276.DOI: 10.7523/j.issn.2095-6134.2012.2.019

• 计算机科学 • 上一篇    下一篇

HIGHT算法的差分故障攻击

范伟杰1,2, 吴文玲1, 张蕾1   

  1. 1. 中国科学院软件研究所信息安全国家重点实验室, 北京 100190;
    2. 中国科学院研究生院, 北京 100049
  • 收稿日期:2011-01-13 修回日期:2011-03-25 发布日期:2012-03-15
  • 通讯作者: 范伟杰
  • 基金资助:

    国家自然科学基金(60873259)和中国科学院创新工程项目资助 

Differential fault analysis on HIGHT

FAN Wei-Jie1,2, WU Wen-Ling1, ZHANG Lei1   

  1. 1. State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China;
    2. Graduate University, Chinese Academy of Sciences, Beijing 100049, China
  • Received:2011-01-13 Revised:2011-03-25 Published:2012-03-15

摘要:

对HIGHT进行了差分故障攻击. 攻击采用单字节级的差分故障模型,在倒数第3轮和倒数第4轮进行故障诱导来恢复密钥. 模拟实验结果显示采用大约32次故障诱导便可恢复密钥,分析的计算复杂度约为256. 模加差分表预计算的复杂度为232.

关键词: 差分故障分析, 轻量级密码算法, HIGHT

Abstract:

In this paper, we present differential fault analysis on HIGHT with a single byte fault model. We inject the fault at the third and fourth rounds from bottom.The 128-bit user key can be obtained by using 32 faulty ciphertexts with a computational complexity of 256. The pre-computed complexity is 232.

Key words: differential fault analysis, lightweight cipher, HIGHT

中图分类号: