Dissertation > Excellent graduate degree dissertation topics show

Differential Fault Analysis of Block Ciphers

Author: YouJianXiong
Tutor: LiChao
School: National University of Defense Science and Technology
Course: Mathematics
Keywords: Block cipher Differential Fault Analysis Serpent KeeLoq FOX
CLC: TN918.1
Type: Master's thesis
Year: 2010
Downloads: 57
Quote: 0
Read: Download Dissertation


Differential Fault Analysis (DFA) is a kind of attack which based on attacking implementation of algorithms by faults induced in hardwares. Since its emergence, DFA has been applied to several kinds of ciphers in our real world, containing public key ciphers and block ciphers. In this thesis, using byte-oriented random fault model, we mainly focus on application of DFA on three kinds of block cipher Serpent , KeeLoq and FOX.Serpent is a new block cipher as a candidate for the Advanced Encryption Standard. By using techniques of differential cryptanalysis and the specialty of the diffusion layer and the key schedule, we present a practical fault analysis attacks on Serpent. It is shown by experiments that the 128 bit master key can be obtained through 20 faulty ciphertexts on average. The results imply that Serpent is not immune to differential fault analysis.KeeLoq is a block cipher with a 32-bit block size and a 64-bit key. It is widely used in wireless devices that unlock the doors and alarms in cars manufactured. In this paper, based on the differential property of the non-linear function NLF, we present a practical differential fault analysis attacks on KeeLoq. Theory and experiments show that we can recover 1 bit key through 0.71 faulty ciphertexts on average.FOX is a family of symmetric block ciphers that helps to secure digital media, communications, and storage. In this paper, we present an improved fault attack on FOX64. Our improved method can deduce any round subkey through 4.25 faults on average. Compared with the previous fault attack, which recovers the last round sub-key through 11.45 faults on average, the number of faults in our improved attack is significantly reduced. Further, the technique of the proposed attack in this paper can also be easily extended to other series of FOX.

Related Dissertations

  1. The Inductive Load Based Vehicle Body Network Control System,U463.6
  2. Diet Habitat and Interspecific Relationship of Three Carnivorous Species in the Southern Junggar Basin,Q958.1
  3. The Study of Pathogen Isolation and Rapid Detection on Gardnerella Vaginalis of Fox,S858.9
  4. The Expression and Significance of FOXC2 in Endometrial Carcinoma,R737.33
  5. The Research of Rijndael Algorithm for Document Encryption,TP309.7
  6. Research of the Block Ciphers’ Capability to Asist the Differential Cryptanalysis,TN918.2
  7. Chaotic Network File System password,TN918.2
  8. Purification of PMSG and Its Effect on Ovary and Uterus of Immature Mice and Pre-Puberal Blue Foxes,S865.23
  9. Effects of ZQR on Plasma Glucose and Expression of Hepatic FoxO1 in Type 2 Diabetic Rats,R285.5
  10. Study on Character of (X+K)mod2~n and Application in Database Encryption System,TP309.7
  11. Design and Analysis for Diffusion Structure of Block Ciphers,TN918.1
  12. On the Female Fox Image in LiaoZhaiZhiYi,I207.419
  13. Differential Attack of Reduced-round Block Cipher Serpent and ICEBERG,TN918.1
  14. Provable Security for Feistel Ciphers Containing SPN Structure,TN918.1
  15. Effects of Different Zinc Levels on Production Performance and Blood Biochemical Indexes of Silver Foxes,S865.23
  16. Trying to Discuss the Using of Fox-ghost Theme in Notes at Yue Wei Cao Tang,I207.41
  17. Comparison Study on the Ghost and Fox of 《Yetansuilu》 and 《Liaozhaizhiyi》,I207.419
  18. The Micro-Structure and Immunohistochemical Studies in the Digestive Tract of Blue Fox,S865.23
  19. Comparison of Tibetan Fox’s Home Range Estimators and the Influence of Major Food on the Home Range Character,Q958
  20. Effect of Replacing Corn by Potato of Energy Feeds in Diet for Weight Gain and Digestion on Growth Blue Fox,S865.23

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile