对MIBS分组密码的差分故障攻击

Differential Fault Attack on Block Cipher MIBS

  • 摘要: MIBS分组密码是一个基于Feistel结构的轻量级分组密码,适用于RFID、无线传感器等资源受限的硬件环境。差分故障攻击是针对硬件密码算法较为有效的旁路分析手段,通过插入故障和故障传播中涉及的相关密钥之间的关系进行密钥恢复。该文利用S盒的差分不均匀性,通过建立明文差分、密文差分和候选输入值之间的关系,在MIBS密码的最后一轮注入两次故障,可以快速恢复最后一轮密钥信息,进而恢复全部密钥。该攻击思想具有一般性,对基于Feistel结构的轻量级分组密码算法普遍适用。

     

    Abstract: MIBS is a lightweight block cipher based on Feistel structure, suitable for RFID, wireless sensors and other resource-constrained hardware environment. Differential fault attack is a kind of side channel analysis method which is effective for hardware cipher algorithms. The key recovery is carried out by the relationship of the related-key involved both in the inserting fault and the fault propagation. By using the difference nonuniformity of S-box, through the establishment of the relationship among plaintext difference, ciphertext difference and candidate input value, injecting two faults in the last round of MIBS, the last round key can be quickly recovered, and then all the keys. The idea of the attack is general, and it is generally applicable for the lightweight ciphers based on Feistel structure.

     

/

返回文章
返回