Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of ...Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of Things. As one of the AES finalists, the Serpent is a 128-bit Substitution-Permutation Network(SPN) cryptosystem. It has 32 rounds with the variable key length between 0 and 256 bits, which is flexible to provide security in the Internet of Things. On the basis of the byte-oriented model and the differential analysis, we propose an effective differential fault attack on the Serpent cryptosystem. Mathematical analysis and simulating experiment show that the attack could recover its secret key by introducing 48 faulty ciphertexts. The result in this study describes that the Serpent is vulnerable to differential fault analysis in detail. It will be beneficial to the analysis of the same type of other iterated cryptosystems.展开更多
PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES...PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES and current results are different. This paper aims to make a comprehensive study of algebraic fault analysis(AFA) on PRINCE. How to build the equations for PRINCE and faults are explained. Extensive experiments are conducted. Under nibble-based fault model, AFA with three or four fault injections can succeed within 300 seconds with a very high probability. Under other fault models such as byte-based, half word-based, word-based fault models, the faults become overlapped in the last round and previous DFAs are difficult to work. Our results show that AFA can still succeed to recover the full master key. To evaluate security of PRINCE against fault attacks, we utilize AFA to calculate the reduced entropy of the secret key for given amount of fault injections. The results can interpret and compare the efficiency of previous work. Under nibble-based fault model, the master key of PRINCE can be reduced to 29.69 and 236.10 with 3 and 2 fault injections on average, respectively.展开更多
A common software to analyze fuze fault tree is developed to simplify the trivialness in generating the fuze fault tree and reduce the manual calculation work. The overall structure, function and implementation of the...A common software to analyze fuze fault tree is developed to simplify the trivialness in generating the fuze fault tree and reduce the manual calculation work. The overall structure, function and implementation of the system are introduced. The software based on Windows platform is used to generate the fuze fault tree in graphics mode. A quantitative analysis of fuze fault tree can be obtained by the method of minimum cut sets. A calculation example is used to verify the function of the software. Consequently, the expected requirements of this software system are achieved to a certain level.展开更多
A fault sensitivity analysis(FSA)-resistance model based on time randomization is proposed.The randomization unit is composed of two parts,namely the configurable register array(R-A)and the decoder(chiefly random...A fault sensitivity analysis(FSA)-resistance model based on time randomization is proposed.The randomization unit is composed of two parts,namely the configurable register array(R-A)and the decoder(chiefly random number generator,RNG).In this way,registers chosen can be either valid or invalid depending on the configuration information generated by the decoder.Thus,the fault sensitivity information can be confusing.Meanwhile,based on this model,a defensive scheme is designed to resist both fault sensitivity analysis(FSA)and differential power analysis(DPA).This scheme is verified with our experiments.展开更多
The application ofbispectrum analysis in fault diagnosis o f gears is studied in this paper. Bispectrum analysis is capable of removing Gau ssian or symmetric non-Gaussian noise and providing more information than pow...The application ofbispectrum analysis in fault diagnosis o f gears is studied in this paper. Bispectrum analysis is capable of removing Gau ssian or symmetric non-Gaussian noise and providing more information than power spectrum analysis.The results of the research show that normal gear sig nals, cracked gear signals and broken gear signals can be easily distinguished b y using bispectrumas the signal features. The bispectrum diagonal slice B_x(ω_1,ω_2) can be used to identifythe gear condition automatically.展开更多
An improved safety analysis based on the causality diagram for the complex system of micro aero-engines is presented.The study is examined by using the causality diagram in analytical failure cases due to rupture or p...An improved safety analysis based on the causality diagram for the complex system of micro aero-engines is presented.The study is examined by using the causality diagram in analytical failure cases due to rupture or pentration in the receiver of micro turbojet engine casing,and the comparisons are also made with the results from the traditional fault tree analysis.Experimental results show two main advantages:(1)Quantitative analysis which is more reliable for the failure analysis in jet engines can be produced by the causality diagram analysis;(2)Graphical representation of causality diagram is easier to apply in real test cases and more effective for the safety assessment.展开更多
In this paper,a fault location method for the petal-shaped distribution network(PSDN)with inverter-interfaced distributed generators(IIDGs)is proposed to shorten the time of manual inspection.In order to calculate the...In this paper,a fault location method for the petal-shaped distribution network(PSDN)with inverter-interfaced distributed generators(IIDGs)is proposed to shorten the time of manual inspection.In order to calculate the fault position,the closed-loop structure of the PSDN is skillfully exploited,and the common control strategies of IIDGs are considered.For asymmetrical faults,a fault line identification formula based on the negative-sequence current phase differences is presented,and a fault location formula only utilizing the negative-sequence current amplitudes is derived to calculated the fault position.For symmetrical faults,the positive-sequence current at both ends of lines and the current output from IIDGs are used to identify the fault line,and the positive-sequence current on multiple lines are used to pinpoint the fault position.In this method,corresponding current phasors are separated into amplitudes and phases to satisfy the limitation of communication level.The simulation results show that the error is generally less than 1%,and the accuracy of the proposed method is not affected by the fault type,fault position,fault resistance,load current,and the IIDG penetration.展开更多
Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offioading system and fire accidents were analyzed based on the floating produc...Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offioading system and fire accidents were analyzed based on the floating production, storage and offioading (FPSO) features. Fault tree analysis (FTA), and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS). Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases, statistical data, and risk control measures examined. Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process, using risk priority number (RPN) methods to evaluate their severity rank. The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offioading, and the fire FMEA gave the priorities and suggested processes. The research has practical importance for the security analysis problems of FPSO.展开更多
基金supported by the National Natural Science Foundation of China under Grant No.61003278,No.61073150 and No.61202371Innovation Program of Shanghai Municipal Education Commission under Grant No.14ZZ066+5 种基金the open research fund of State Key Laboratory of Information Securitythe Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Securitythe Fundamental Research Funds for the Central Universities,National Key Basic Research Program of China under Grant No.2013CB338004China Postdoctoral Science Foundation under Grant No.2012M521829Shanghai Postdoctoral Research Funding Program under Grant No.12R21414500the National Social Science Foundation of China under Grant No.13CFX054
文摘Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of Things. As one of the AES finalists, the Serpent is a 128-bit Substitution-Permutation Network(SPN) cryptosystem. It has 32 rounds with the variable key length between 0 and 256 bits, which is flexible to provide security in the Internet of Things. On the basis of the byte-oriented model and the differential analysis, we propose an effective differential fault attack on the Serpent cryptosystem. Mathematical analysis and simulating experiment show that the attack could recover its secret key by introducing 48 faulty ciphertexts. The result in this study describes that the Serpent is vulnerable to differential fault analysis in detail. It will be beneficial to the analysis of the same type of other iterated cryptosystems.
基金supported in part by the Major State Basic Research Development Program (973 Plan) of China under thegrant 2013CB338004the National Natural Science Foundation of China under the grants 61173191, 61271124, 61272491, 61309021, 61472357+1 种基金by the Zhejiang Provincial Natural Science Foundation of China under the grant LY13F010001by the Fundamental Research Funds for the Central Universities under the grant 2015QNA5005
文摘PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES and current results are different. This paper aims to make a comprehensive study of algebraic fault analysis(AFA) on PRINCE. How to build the equations for PRINCE and faults are explained. Extensive experiments are conducted. Under nibble-based fault model, AFA with three or four fault injections can succeed within 300 seconds with a very high probability. Under other fault models such as byte-based, half word-based, word-based fault models, the faults become overlapped in the last round and previous DFAs are difficult to work. Our results show that AFA can still succeed to recover the full master key. To evaluate security of PRINCE against fault attacks, we utilize AFA to calculate the reduced entropy of the secret key for given amount of fault injections. The results can interpret and compare the efficiency of previous work. Under nibble-based fault model, the master key of PRINCE can be reduced to 29.69 and 236.10 with 3 and 2 fault injections on average, respectively.
文摘A common software to analyze fuze fault tree is developed to simplify the trivialness in generating the fuze fault tree and reduce the manual calculation work. The overall structure, function and implementation of the system are introduced. The software based on Windows platform is used to generate the fuze fault tree in graphics mode. A quantitative analysis of fuze fault tree can be obtained by the method of minimum cut sets. A calculation example is used to verify the function of the software. Consequently, the expected requirements of this software system are achieved to a certain level.
文摘A fault sensitivity analysis(FSA)-resistance model based on time randomization is proposed.The randomization unit is composed of two parts,namely the configurable register array(R-A)and the decoder(chiefly random number generator,RNG).In this way,registers chosen can be either valid or invalid depending on the configuration information generated by the decoder.Thus,the fault sensitivity information can be confusing.Meanwhile,based on this model,a defensive scheme is designed to resist both fault sensitivity analysis(FSA)and differential power analysis(DPA).This scheme is verified with our experiments.
文摘The application ofbispectrum analysis in fault diagnosis o f gears is studied in this paper. Bispectrum analysis is capable of removing Gau ssian or symmetric non-Gaussian noise and providing more information than power spectrum analysis.The results of the research show that normal gear sig nals, cracked gear signals and broken gear signals can be easily distinguished b y using bispectrumas the signal features. The bispectrum diagonal slice B_x(ω_1,ω_2) can be used to identifythe gear condition automatically.
文摘An improved safety analysis based on the causality diagram for the complex system of micro aero-engines is presented.The study is examined by using the causality diagram in analytical failure cases due to rupture or pentration in the receiver of micro turbojet engine casing,and the comparisons are also made with the results from the traditional fault tree analysis.Experimental results show two main advantages:(1)Quantitative analysis which is more reliable for the failure analysis in jet engines can be produced by the causality diagram analysis;(2)Graphical representation of causality diagram is easier to apply in real test cases and more effective for the safety assessment.
基金supported by State Grid Science and Technology Project:Research on Key Protection Technologies for New-type Urban Distribution Network with Controllable Sources and Loads(5100-201913019A-0-0-00).
文摘In this paper,a fault location method for the petal-shaped distribution network(PSDN)with inverter-interfaced distributed generators(IIDGs)is proposed to shorten the time of manual inspection.In order to calculate the fault position,the closed-loop structure of the PSDN is skillfully exploited,and the common control strategies of IIDGs are considered.For asymmetrical faults,a fault line identification formula based on the negative-sequence current phase differences is presented,and a fault location formula only utilizing the negative-sequence current amplitudes is derived to calculated the fault position.For symmetrical faults,the positive-sequence current at both ends of lines and the current output from IIDGs are used to identify the fault line,and the positive-sequence current on multiple lines are used to pinpoint the fault position.In this method,corresponding current phasors are separated into amplitudes and phases to satisfy the limitation of communication level.The simulation results show that the error is generally less than 1%,and the accuracy of the proposed method is not affected by the fault type,fault position,fault resistance,load current,and the IIDG penetration.
基金Supported by the Fundamental Research Funds for the Central Universities (HEUCFR1109)"111" projects foundation (Grant No.B07019) from State Administration of Foreign Experts Affairs of China and Ministry of Education of China
文摘Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offioading system and fire accidents were analyzed based on the floating production, storage and offioading (FPSO) features. Fault tree analysis (FTA), and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS). Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases, statistical data, and risk control measures examined. Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process, using risk priority number (RPN) methods to evaluate their severity rank. The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offioading, and the fire FMEA gave the priorities and suggested processes. The research has practical importance for the security analysis problems of FPSO.