Method for detecting differential fault attack resisting capability of AES-OTR algorithm

A differential fault attack and algorithm technology, applied in the field of information security, can solve the problems of evaluating the ability of the AES-OTR algorithm to resist differential fault attacks, hidden dangers of product safety, etc., and achieve the effect of accurate, simple and easy-to-implement methods

Active Publication Date: 2018-05-18
DONGHUA UNIV
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there is no public report evaluating the ability of the AES-OTR algorithm to resist different

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting differential fault attack resisting capability of AES-OTR algorithm
  • Method for detecting differential fault attack resisting capability of AES-OTR algorithm
  • Method for detecting differential fault attack resisting capability of AES-OTR algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Below in conjunction with specific embodiment, further illustrate the present invention.

[0049] The symbols used in this embodiment are explained as follows:

[0050] M: plaintext message;

[0051] m: the number of blocks of plaintext or ciphertext;

[0052] M[p]: the pth group of plaintext, where 1≤p≤m;

[0053] C[q]: the pth block of the ciphertext, where 1≤q≤m;

[0054] C i , ΔC i : The i-th byte of the ciphertext, and the fault difference of the i-th byte, where 1≤i≤16;

[0055] K: original key; K i : The i-th byte of the key, where 1≤i≤16;

[0056] : Indicates that the tenth round of the algorithm’s S-box inputs the i-th index value, 1≤i≤16,

[0057] F: Indicates the difference ratio corresponding to the input index value of the tenth round of the S-box of the algorithm

[0058] C: The correct output after the algorithm processes the message;

[0059] C * : When the algorithm processes the message, the error output generated after importing the fault...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for detecting the differential fault attack resisting capability of an AES-OTR algorithm. The method comprises the following steps: firstly, performing operation and outputting in a secure environment not added with any fault; secondly, encrypting the message, and inducing the occurrence of a fault through a series of operations for changing the clock, voltage, humidity and the like in an artificial control encryption process to obtain error output; and lastly, establishing a function relationship among correct output, the error output and a key through analysis, deriving the possible location of a fault in order to reduce the guess space of the key, obtaining a subkey by an exhaustion method, and obtaining an original key by a key expansion algorithm. The method only needs to import one fault to deduce the key, so that the method is easy to implement and simple in principle, and an encryption mechanism can be effectively protected from being damaged. Through adoption of the method, an important theoretical basis is laid for the evaluation of a software and hardware security system using the AES-OTR algorithm.

Description

technical field [0001] The invention relates to a method for detecting an AES-OTR algorithm against differential fault attacks, which is mainly applied to inspecting products packaged with the method, and belongs to the technical field of information security. Background technique [0002] With the rapid development of information technology, it provides great convenience to people's life. However, in the process of using information technology, a large amount of data will be generated. To ensure the security of these data, it is necessary to rely on safe cryptographic algorithms. As the core of information security, cryptographic algorithms mainly depend on the security of keys. The AES-OTR algorithm is a new authentication encryption algorithm proposed by Japanese scholar Kazuhiko Minematsu in March 2014, which can provide both confidentiality and integrity authentication for data transmission. [0003] The differential fault attack combines the fault attack and the diffe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/06
CPCH04L9/002H04L9/004H04L9/0631
Inventor 李玮曹珊廖林峰吴益鑫孙莉姜霖霖刘以一
Owner DONGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products