|
|
Differential Fault Analysis on SHACAL-2 |
Wei Yue-chuan①,Li Lin②④,Li Rui-lin②,Li Chao①②③ |
①College of Computer Science of National University of Defense Technology, Changsha 410073, China; ②Science College of National University of Defense Technology, Changsha 410073, China;
③State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing 100039, China; ④Xi’an Army Command College, Xi’an 710108, China |
|
|
Abstract By using word-oriented fault model and the technique of differential cryptanalysis, the security of SHACAL-2 against differential fault analysis is evaluated. Result shows that SHACAL-2 is not immune to such kind of attack. 8 faulty ciphertexts can recover a sub key of 32 bit on average and 128 faulty ciphertexts are needed to recover all the 512 bit keys.
|
Received: 27 November 2008
|
|
Corresponding Authors:
Wei Yue-chuan
|
|
|
|
|
|
|