Unlock instant, AI-driven research and patent intelligence for your innovation.

Differential fault analysis (DFA) method and system for Twofish encrypted chip

An analysis method, technology of encrypting chips, applied in the field of cryptographic security

Inactive Publication Date: 2014-04-16
WUHAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As one of the final five candidate algorithms of AES, the Twofish algorithm has strong security, and the S box is controlled by a key. It is difficult to break through the existing DFA attack method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Differential fault analysis (DFA) method and system for Twofish encrypted chip
  • Differential fault analysis (DFA) method and system for Twofish encrypted chip
  • Differential fault analysis (DFA) method and system for Twofish encrypted chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Definition 1: The binary function f is a nonlinear operation on GF(28) and is defined as follows:

[0057] f:(GF(2 8 ), GF(2 8 ))→GF(2 8 )

[0058] f(x,c)=x+c mod2 8

[0059] According to Definition 1, the modulo-added input-output differential set can be derived.

[0060] Definition 2: The f function is defined as in definition 1, and the set ad(ε, γ, d) is obtained:

[0061] ad ( ϵ , γ , d ) = { x | f ( x , c ) ⊕ f ( x ⊕ ϵ , c + d ) = γ , ∀ c ∈ GF ( 2 8 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cryptographic chip security, in particular to a differential fault analysis (DFA) method and a DFA system for Twofish encrypted hardware. In the invention, the characteristics of encryption systems such as Twofish with unknown S boxes are combined, error transmission paths in the encrypted hardware are tracked, DFA is performed under the condition of not knowing the S boxes, and the conventional DFA method is improved, so the DFA still can be effectively performed under the condition of not knowing the S boxes to obtain a key; a possible set is screened by using an impossible differential set based on the DFA, thereby effectively analyzing the key; and a byte random error model and an impossible differential set method are combined, so the complexity of an algorithm is effectively reduced, and the 96bit key can be successfully recovered with the calculation complexity of 4*224 only by 16 pairs of error samples in the DFA method.

Description

technical field [0001] The invention relates to the technical field of cryptographic security, in particular to a DFA analysis method and system for Twofish hardware, which utilizes DFA technology to perform Twofish cryptographic analysis and evaluate its security. Background technique [0002] DFA 【1】 (Differential Fault Analysis) technology is an efficient cryptanalysis method, which is based on the fact that a brief wrong input in the register will lead to a small amount of wrong output. We use this principle to insert one or more bit errors in the encryption or decryption process, and we can obtain the error output difference corresponding to the wrong input, so that we can obtain information such as the S-box component or the key of the cryptographic system through differential analysis. [0003] The DFA attack model we use here is the byte random error model, which assumes that the attacker can introduce a random error of one byte in a certain step of the encryption a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 唐明邓慧伍前红沈菲张欣雨邱镇龙
Owner WUHAN UNIV