DocumentCode :
3463579
Title :
Differential Fault Analysis on SHACAL-1
Author :
Li, Ruilin ; Li, Chao ; Gong, Chunye
Author_Institution :
Sci. Coll., Dept. of Math. & Syst. Sci., Nat. Univ. of Defense Technol., Changsha, China
fYear :
2009
fDate :
6-6 Sept. 2009
Firstpage :
120
Lastpage :
126
Abstract :
SHACAL-1, known as one of the finalists of the NESSIE project, originates from the compression component of the widely used hash function SHA-1. The requirements of confusion and diffusion are implemented through mixing operations and rotations other than substitution and permutation, thus there exists little literature on its immunity against fault attacks. In this paper, we apply differential fault analysis on SHACAL-1 in a synthetic approach. We introduce the random word fault model, present some theoretical arguments, and give an efficient fault attack based on the characteristic of the cipher. Both theoretical predications and experimental results demonstrate that, 72 random faults are needed to obtain 512 bits key with successful probability more than 60%, while 120 random faults are enough to obtain 512 bits key with successful probability more than 99%.
Keywords :
cryptography; failure analysis; NESSIE project; SHACAL-1; cipher characteristics; compression component; differential fault analysis; fault attacks; hash function SHA-1; probability; random word fault model; synthetic approach; theoretical arguments; Chaos; Doped fiber amplifiers; Educational institutions; Fault diagnosis; Information analysis; Information security; Laboratories; Mathematics; Public key; Public key cryptography; Block Cipher; Differential Fault Analysis; SHACAL-1;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2009 Workshop on
Conference_Location :
Lausanne
Print_ISBN :
978-1-4244-4972-9
Type :
conf
DOI :
10.1109/FDTC.2009.41
Filename :
5412851
Link To Document :
بازگشت