-
- CHEN Hao
- Department of Information Engineering, Ordnance Engineering College
-
- WANG Tao
- Department of Information Engineering, Ordnance Engineering College
-
- GUO Shize
- Institute of North Electronic Equipment
-
- ZHAO Xinjie
- Institute of North Electronic Equipment
-
- ZHANG Fan
- College of Information Science and Electrical Engineering, Zhejiang University Science and Technology on Communication Security Laboratory
-
- LIU Jian
- College of Communication and Information Engineering, Nanjing University of Posts and Telecommunications
抄録
<p>The differential fault analysis of SOSEMNAUK was presented in Africacrypt in 2011. In this paper, we improve previous work with algebraic techniques which can result in a considerable reduction not only in the number of fault injections but also in time complexity. First, we propose an enhanced method to determine the fault position with a success rate up to 99% based on the single-word fault model. Then, instead of following the design of SOSEMANUK at word levels, we view SOSEMANUK at bit levels during the fault analysis and calculate most components of SOSEMANUK as bit-oriented. We show how to build algebraic equations for SOSEMANUK and how to represent the injected faults in bit-level. Finally, an SAT solver is exploited to solve the combined equations to recover the secret inner state. The results of simulations on a PC show that the full 384 bits initial inner state of SOSEMANUK can be recovered with only 15 fault injections in 3.97h.</p>
収録刊行物
-
- IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
-
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E100.A (3), 811-821, 2017
一般社団法人 電子情報通信学会
- Tweet
詳細情報 詳細情報について
-
- CRID
- 1390282681287074560
-
- NII論文ID
- 130005397028
-
- ISSN
- 17451337
- 09168508
-
- 本文言語コード
- en
-
- データソース種別
-
- JaLC
- Crossref
- CiNii Articles
-
- 抄録ライセンスフラグ
- 使用不可