上海交通大学学报(自然版) ›› 2013, Vol. 47 ›› Issue (07): 1131-1136.

• 无线电电子学、电信技术 • 上一篇    下一篇

对流密码算法Phelix的差分故障攻击

张中亚1,2,关杰1   

  1. (1. 信息工程大学,郑州 450004;2.解放军71282部队, 河南 洛阳 471000)
     
  • 收稿日期:2011-07-20 出版日期:2013-07-30 发布日期:2013-07-30
  • 基金资助:

    国家自然科学基金资助项目(61202491)

Differential Analysis of Stream Cipher Phelix

ZHANG Zhongya1,2,GUAN Jie1
  

  1. (1. Information Engineering University, Zhengzhou 450004, China; 2. Unit 71282 of the PLA, Luoyang 471000, Henan, China)
  • Received:2011-07-20 Online:2013-07-30 Published:2013-07-30

摘要:

流密码算法Phelix是ESTREAM计划的一个候选算法,文中给出了模2n加环节XY=Z的一个基于单比特故障的差分方程组求解算法.利用该算法采用面向比特的故障诱导模型对Phelix进行了差分故障攻击,该攻击理论上只需652个单比特故障就能完全恢复256 bit的工作密钥,计算复杂度为O(220).实验结果显示,Phelix算法对差分故障攻击是不安全的.
 

关键词: 流密码, Phelix算法, 差分方程, 差分故障攻击

Abstract:

Phelix is a candidate algorithm for the ESTREAM stream cipher project. An algorithm was presented to solve a system of differential equations based on single-bit fault on XY=Z in this paper. Then a bit-oriented differential fault analysis of Phelix based on the algorithm was shown. Theoretically, the 256-bit working key can be obtained by using 652 bit-faults, with the computational complexity of O(220). The result shows that the stream cipher Phelix is vulnerable to differential fault analysis.
 

Key words: stream cipher, Phelix, differential equation, differential fault analysis

中图分类号: