Reverse Engineering Analysis Based on Differential Fault Analysis Against Secret S- boxes
Reverse Engineering Analysis Based on Differential Fault Analysis Against Secret S- boxes作者机构:State Key Laboratory of AIS & TC Ministry of Education Wuhan University Wuhan 430072 P. R. China School of Computers Wuhan University Wuhan 430072 P. R. China
出 版 物:《China Communications》 (中国通信(英文版))
年 卷 期:2012年第9卷第10期
页 面:10-22页
核心收录:
学科分类:1305[艺术学-设计学(可授艺术学、工学学位)] 13[艺术学] 07[理学] 08[工学] 080203[工学-机械设计及理论] 081304[工学-建筑技术科学] 070104[理学-应用数学] 0802[工学-机械工程] 0813[工学-建筑学] 0701[理学-数学] 080201[工学-机械制造及其自动化]
基 金:This work was supported by the National Natural Science Foundation of China under Cxants No.60970116 No. 60970115 No. 61202386 No. 61003267
主 题:DFA reverse engmeenng analysis block cipher SPN feistel S-box
摘 要:To evaluate the security of cipher algo- rithrrs with secret operations, we built a new reverse engineering analysis based on Differential Fault Analysis (DFA) to recover the secret S-boxes in Secret Private Network (SPN) and Feistel structures, which are two of the most typical structures in block ciphers. This paper gives the general definitions of these two structures and proposes the reverse engineering analysis of each structure. Furthermore, we evaluate the complexity of the proposed reverse analyses and theoretically prove the effectiveness of the reverse method. For the Twoflsh-like and AES-like algorithrm, the experimental results verify the correctness and efficiency of the reverse analysis. The proposed reverse analysis can efficiently recover the secret S-boxes in the encryp'don algorithms writh SPN and Feistel structures. It can successfully recover the Twoflsh- like algorithm in 2.3 s with 256 faults and the AES- like algorithm in 0.33 s with 23 faults.