Study on the efficiency and fault tolerance of block cipher algorithm based on energy analysis

نویسنده

  • Hao Wang
چکیده

Block cipher is one of the most widely used cryptographic systems. It is a kind of symmetric cipher algorithm, which uses the same key for encryption and decryption. In essence, the block cipher is a permutation with a key, which divides the data into groups with equal length and is converted to the same length. At present, the main block cipher algorithm has high security, it is difficult to be mathematically analyzed. However, the mathematical analysis method is mainly aimed at the analysis of the text and the cipher text, and has some limitations in the security analysis of the encryption device. Since (1) is proposed to study the operating time of timing attacks since, side channel attack and defense has gradually become the cryptography is one of the important branches. Unlike the traditional brute force crack, or the account of the weakness of the password theory, the side channel attack analysis of the password algorithm to the physical realization of the process of certain intermediate values of the leakage of information, thus obtaining the key. Time, electromagnetic wave, and even sound can be used as the side channel information of the attack code system. In addition, the energy consumption analysis is one of the most effective means of side channel attack.Attackers usually want to attack as fast and efficient as possible, we use this as the starting point to propose a more flexible based on the two step distance of the bit collision attack, which uses the energy track distance model and the idea of a bit by bit. Take the algorithm as an example, select a full zero express and a special expressly factory each strictly contains a wide range of the same byte, the second is, the other bits are. And key of XOR box input values were obtained, each box of the input value is the change of key bytes of the bit and the Hamming weight before and after the operation also change. Due to input the corpse does not cause any bit change and therefore input tightly, through the comparison of different box input value of Hamming weight difference whether and input the same, you can infer the corresponding key bytes of the bit is equal.Therefore, under the different energy analysis, the different structures of the box of the anti attack. The design of the algorithm can be considered in the case of different attack method in the case of the security strength to meet specific needs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Genetic Based Resource Management Algorithm Considering Energy Efficiency in Cloud Computing Systems

Cloud computing is a result of the continuing progress made in the areas of hardware, technologies related to the Internet, distributed computing and automated management. The Increasing demand has led to an increase in services resulting in the establishment of large-scale computing and data centers, in addition to high operating costs and huge amounts of electrical power consumption. Insuffic...

متن کامل

Improving the palbimm scheduling algorithm for fault tolerance in cloud computing

Cloud computing is the latest technology that involves distributed computation over the Internet. It meets the needs of users through sharing resources and using virtual technology. The workflow user applications refer to a set of tasks to be processed within the cloud environment. Scheduling algorithms have a lot to do with the efficiency of cloud computing environments through selection of su...

متن کامل

Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...

متن کامل

Novel Impossible Differential Cryptanalysis of Zorro Block Cipher

Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...

متن کامل

Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers

Differential Fault Intensity Analysis (DFIA) is a recently introduced fault analysis technique. This technique is based on the observation that faults are biased and thus are non-uniformly distributed over the cipher state variables. The adversary uses the fault bias as a source of leakage by controlling the intensity of fault injection. DFIA exploits statistical analysis to correlate the secre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015