Acta Scientiarum Naturalium Universitatis Pekinensis
Previous Articles Next Articles
YOU Jianxiong1, LI Ruilin1, LI Chao1,2
Received:
Online:
Published:
游建雄1,李瑞林1,李超1,2
Abstract: The authors analyse the differential property of the non-linear function (NLF) . By using byte-oriented random fault model, a practical fault analysis attacks on KeeLoq is presented. Theoretical analysis and experiments show that 1-bit key can be recovered through 0.707617 faulty ciphertexts on average.
Key words: block cipher, KeeLoq, differential fault analysis
摘要: 基于面向字节的随机故障模型, 通过分析 KeeLoq 算法中非线性函数(NLF)的差分性质, 提出了对 KeeLoq 算法的差分故障攻击。理论分析和实验结果表明, 恢复 1 比特密钥信息平均只需要0.707617个错误。
关键词: 分组密码, KeeLoq, 差分故障分析
CLC Number:
TN918
YOU Jianxiong,LI Ruilin,LI Chao. Fault Attack on Lightweight Block Cipher KeeLoq[J]. Acta Scientiarum Naturalium Universitatis Pekinensis.
游建雄,李瑞林,李超. 轻量级分组密码KeeLoq的故障攻击[J]. 北京大学学报(自然科学版).
Add to citation manager EndNote|Ris|BibTeX
URL: https://xbna.pku.edu.cn/EN/
https://xbna.pku.edu.cn/EN/Y2010/V46/I5/756