Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of ...Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of Things. As one of the AES finalists, the Serpent is a 128-bit Substitution-Permutation Network(SPN) cryptosystem. It has 32 rounds with the variable key length between 0 and 256 bits, which is flexible to provide security in the Internet of Things. On the basis of the byte-oriented model and the differential analysis, we propose an effective differential fault attack on the Serpent cryptosystem. Mathematical analysis and simulating experiment show that the attack could recover its secret key by introducing 48 faulty ciphertexts. The result in this study describes that the Serpent is vulnerable to differential fault analysis in detail. It will be beneficial to the analysis of the same type of other iterated cryptosystems.展开更多
A fault sensitivity analysis(FSA)-resistance model based on time randomization is proposed.The randomization unit is composed of two parts,namely the configurable register array(R-A)and the decoder(chiefly random...A fault sensitivity analysis(FSA)-resistance model based on time randomization is proposed.The randomization unit is composed of two parts,namely the configurable register array(R-A)and the decoder(chiefly random number generator,RNG).In this way,registers chosen can be either valid or invalid depending on the configuration information generated by the decoder.Thus,the fault sensitivity information can be confusing.Meanwhile,based on this model,a defensive scheme is designed to resist both fault sensitivity analysis(FSA)and differential power analysis(DPA).This scheme is verified with our experiments.展开更多
基金supported by the National Natural Science Foundation of China under Grant No.61003278,No.61073150 and No.61202371Innovation Program of Shanghai Municipal Education Commission under Grant No.14ZZ066+5 种基金the open research fund of State Key Laboratory of Information Securitythe Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Securitythe Fundamental Research Funds for the Central Universities,National Key Basic Research Program of China under Grant No.2013CB338004China Postdoctoral Science Foundation under Grant No.2012M521829Shanghai Postdoctoral Research Funding Program under Grant No.12R21414500the National Social Science Foundation of China under Grant No.13CFX054
文摘Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of Things. As one of the AES finalists, the Serpent is a 128-bit Substitution-Permutation Network(SPN) cryptosystem. It has 32 rounds with the variable key length between 0 and 256 bits, which is flexible to provide security in the Internet of Things. On the basis of the byte-oriented model and the differential analysis, we propose an effective differential fault attack on the Serpent cryptosystem. Mathematical analysis and simulating experiment show that the attack could recover its secret key by introducing 48 faulty ciphertexts. The result in this study describes that the Serpent is vulnerable to differential fault analysis in detail. It will be beneficial to the analysis of the same type of other iterated cryptosystems.
文摘A fault sensitivity analysis(FSA)-resistance model based on time randomization is proposed.The randomization unit is composed of two parts,namely the configurable register array(R-A)and the decoder(chiefly random number generator,RNG).In this way,registers chosen can be either valid or invalid depending on the configuration information generated by the decoder.Thus,the fault sensitivity information can be confusing.Meanwhile,based on this model,a defensive scheme is designed to resist both fault sensitivity analysis(FSA)and differential power analysis(DPA).This scheme is verified with our experiments.