MICKEY的差分錯(cuò)誤攻擊的研究
發(fā)布時(shí)間:2018-03-06 17:41
本文選題:差分錯(cuò)誤攻擊 切入點(diǎn):MICKEY-128 出處:《西安電子科技大學(xué)》2015年碩士論文 論文類型:學(xué)位論文
【摘要】:隨著信息時(shí)代的來臨,人們對(duì)信息的安全越來越重視,各種保護(hù)信息安全的密碼算法被提出。為了證明這些算法的安全性,就需要不斷的用各種分析方法對(duì)其進(jìn)行分析。然而傳統(tǒng)的分析方法,例如窮舉法攻擊,代數(shù)攻擊,差分攻擊只能證明算法理論上的安全性,無法證明算法在硬件設(shè)備上實(shí)現(xiàn)后的安全性。差分錯(cuò)誤攻擊方法的提出彌補(bǔ)了這方面的空白,通過采集硬件設(shè)備泄露的信息,能夠?qū)λ惴ㄔ谠O(shè)備中實(shí)現(xiàn)后的安全性進(jìn)行分析。差分錯(cuò)誤攻擊的提出不但為密碼分析者提供了新的分析方法,還為密碼學(xué)的研究打開了新的方向。目前對(duì)于差分錯(cuò)誤攻擊方法的研究方向主要在于如何以較小的代價(jià)正確快速的恢復(fù)出密鑰。本文的一個(gè)工作就是對(duì)基于MICKEY-128 2.0的差分錯(cuò)誤攻擊的改進(jìn),提高了算法工作效率。同時(shí)據(jù)所查資料顯示,在對(duì)MICKEY-128 2.0的差分錯(cuò)誤攻擊的實(shí)現(xiàn)方面的研究中,對(duì)于并行化技術(shù)和分布式計(jì)算的引入還是一個(gè)空白。本文的另外一個(gè)工作就是把這兩項(xiàng)內(nèi)容引入到差分錯(cuò)誤攻擊的實(shí)現(xiàn)中,提高攻擊的速度。本文主要的工作內(nèi)容包括以下兩方面:1、對(duì)Sandip Karmakar和Dipanwita Roy Chowdhury提出的基于MICKEY-128 2.0的差分錯(cuò)誤攻擊方法提出了改進(jìn)。2013年,Sandip Karmakar和Dipanwita Roy Chowdhury對(duì)MICKEY-128 2.0給出了一個(gè)差分錯(cuò)誤攻擊方法,利用方法使用480個(gè)錯(cuò)誤插入和480對(duì)正確/錯(cuò)誤密鑰流即可成功恢復(fù)寄存器的初始狀態(tài)。從錯(cuò)誤插入個(gè)數(shù)的角度來講,該方法是當(dāng)時(shí)性能最佳的方法。然而在本文中我們指出該方法依然存在不足之處,并且給出了改善的方案,最終得到了改善后的差分錯(cuò)誤攻擊方法。改進(jìn)之后的算法在不影響原有算法性能的前提下彌補(bǔ)了它的不足之處,并且適用于其他版本的Mickey密碼。2、從工程實(shí)現(xiàn)的角度對(duì)本文提出的差分錯(cuò)誤攻擊做了改進(jìn)。在工程實(shí)現(xiàn)中,差分錯(cuò)誤攻擊需要采集大量的數(shù)據(jù)進(jìn)行分析,試錯(cuò)。當(dāng)數(shù)據(jù)量過大時(shí),用傳統(tǒng)的單一計(jì)算機(jī),單線程進(jìn)行計(jì)算將會(huì)降低工作效率。為了提高實(shí)際操作的效率,本文融入并行化技術(shù),分布式計(jì)算等概念,讓多個(gè)計(jì)算機(jī),多條線程同時(shí)運(yùn)行,從而提高速度,縮短破譯密鑰的時(shí)間。在擁有兩臺(tái)運(yùn)算節(jié)點(diǎn),每個(gè)節(jié)點(diǎn)配備二核處理器的條件下,引入并行化技術(shù)和分布式計(jì)算后差分錯(cuò)誤攻擊的速度將接近原來的3.6倍。
[Abstract]:With the advent of the information age, people pay more and more attention to the security of information, and a variety of cryptographic algorithms are proposed to protect the security of information. However, traditional analysis methods, such as exhaustive attack, algebraic attack and differential attack, can only prove the theoretical security of the algorithm. It is impossible to prove the security of the algorithm after it is implemented on the hardware device. The differential error attack method has made up the blank in this respect, and the information leaked by the hardware device is collected. It can analyze the security of the algorithm after it is implemented in the device. The differential error attack not only provides a new analysis method for cryptographers, but also provides a new analysis method for cryptographers. It also opens a new direction for the research of cryptography. At present, the main research direction of differential error attack is how to recover the key correctly and quickly at a lower cost. One of the work of this paper is to study the problem based on MICKEY-128 2. 0. Improved differential error attack, The efficiency of the algorithm is improved. According to the data collected, the research on the implementation of differential error attack for MICKEY-128 2.0, The introduction of parallelization and distributed computing is still a blank. Another work of this paper is to introduce these two items into the implementation of differential error attack. The main work of this paper includes the following two aspects: 1. This paper proposes an improvement to the differential error attack method based on MICKEY-128 2.0 proposed by Sandip Karmakar and Dipanwita Roy Chowdhury. In 2013, the Sandip Karmakar and Dipanwita Roy Chowdhury gave a difference to MICKEY-128 2.0. Split error attack method, Using the method 480 error inserts and 480 pairs of correct / error key streams are used to successfully restore the initial state of registers. This method is the best method at that time. However, in this paper, we point out that the method still has some shortcomings, and give an improved scheme. Finally, the improved differential error attack method is obtained. The improved algorithm makes up for its shortcomings without affecting the performance of the original algorithm. And it is suitable for other versions of Mickey password. 2. The differential error attack proposed in this paper is improved from the point of view of engineering implementation. In the engineering implementation, the differential error attack needs to collect a lot of data for analysis, trial and error. When the amount of data is too large, In order to improve the efficiency of practical operation, this paper integrates the concepts of parallelization, distributed computing, and so on, so that multiple computers and multiple threads can run at the same time. Under the condition of having two operation nodes and each node equipped with two core processors, the speed of differential error attack after introducing parallelization and distributed computing will be nearly 3.6 times as fast as the original one.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2015
【分類號(hào)】:TN918.1
【參考文獻(xiàn)】
相關(guān)期刊論文 前4條
1 LI Wei;TAO Zhi;GU Dawu;SUN Li;QU Bo;LIU Zhiqiang;LIU Ya;;An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things[J];中國(guó)通信;2014年06期
2 張文英;劉楓;劉宣;孟帥;;Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32[J];Journal of Shanghai Jiaotong University(Science);2013年02期
3 張麗麗;張玉清;;基于分布式計(jì)算的RC4加密算法的暴力破解[J];計(jì)算機(jī)工程與科學(xué);2008年07期
4 張麗麗;張玉清;;基于分布式計(jì)算的暴力破解分組密碼算法[J];計(jì)算機(jī)工程;2008年13期
,本文編號(hào):1575829
本文鏈接:http://www.sikaile.net/kejilunwen/wltx/1575829.html
最近更新
教材專著