西安电子科技大学学报 ›› 2022, Vol. 49 ›› Issue (1): 121-133.doi: 10.19665/j.issn1001-2400.2022.01.012

• 隐私计算与数据安全专题 • 上一篇    下一篇

针对Fruit v2和Fruit-80的差分错误攻击

乔青蓝(),董丽华()   

  1. 西安电子科技大学 综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
  • 收稿日期:2020-11-24 出版日期:2022-02-20 发布日期:2022-04-27
  • 通讯作者: 董丽华
  • 作者简介:乔青蓝(1996—),女,西安电子科技大学研究生,E-mail: qlqiaoqlqiao@stu.xidian.edu.cn
  • 基金资助:
    国家自然科学基金(61941105)

A differential fault attack of fruit v2 and fruit 80

QIAO Qinglan(),DONG Lihua()   

  1. State Key Laboratory of Integrated Service Network,Xidian University,Xi'an 710071,China
  • Received:2020-11-24 Online:2022-02-20 Published:2022-04-27
  • Contact: Lihua DONG

摘要:

基于轻量级流密码Sprout,Fruit v2、Fruit-80、Fruit-128和Fruit-F等Fruit族小状态流密码自2016年相继被提出。Fruit族密码与Sprout结构相比,最大的区别在于Fruit族密码中非线性反馈移位寄存器与线性反馈移位寄存器的内部状态没有参与轮密钥函数状态更新,这使得对Fruit族密码的密钥恢复攻击相比于Sprout更加困难。借鉴Maitra等学者对Sprout的差分错误攻击方法和Banik等学者对Grain的差分错误攻击方法,在一个相对宽松的错误模型下,对Fruit v2和Fruit-80进行了差分错误攻击。攻击中,在攻击者能够多次注入时间同步的单比特错误的假设下,首先精确识别了错误注入的位置;随后通过求解利用输出函数的一阶差分性质得到的线性方程组,完整恢复了Fruit v2与Fruit-80的整个内部状态,恢复内部状态所需的时间复杂度为216.3(线性反馈移位寄存器)和26.3(非线性反馈移位寄存器)。进一步地借助Cryptominisat-2.9.5 SAT解算器,只需要大约10 min即可求解所有密钥,整个故障攻击所需错误个数为27.3。精确识别错误位置的复杂度分别为26.3(Fruit v2)和27.3(Fruit-80)。

关键词: 侧信道攻击, 错误攻击, 差分错误攻击, 流密码, 小状态流密码

Abstract:

Based on lightweight stream cipher Sprout,small state stream cipher such as Fruit v2,Fruit-80,Fruit-128 and Fruit-F have been proposed since 2016.The difference between Fruit and Sprout is that the round key that participates in the internal state update in Fruit does not involve the internal state of NFSR and LFSR,which makes it more difficult to recover the key of Fruit than Sprout.In this paper,based on Maitra's differential fault attack on Sprout and Banik's differential fault attack on Grain,we will describe a differential fault attack(DFA) on Fruit v2 and Fruit-80 under the most relaxed of assumption.We assume that the attacker can inject multiple,time-synchronized,single bit-flipping faults in the same albeit random register location.e first accurately identify the location of the fault injection,and then according to the affine property of the output function,we formulate a sufficient number of linear equations to recover the whole internal state of the cipher.The results show that the time complexity required to determine the internal state of Fruit v2 and Fruit-80 is 216.3 (LFSR) and 26.3 (NFSR).In the part of key recovery,with the help of cryptomanisat-2.9.5 SAT solver,all the equations can be solved in about 10 minutes.According to the statistics,the number of fault needed to attack is 27.3.The complexity of identifying the correct fault location is 26.3 (Fruit v2) and 27.3 (Fruit-80),respectively.

Key words: side-channel attack, fault analysis, differential fault attack, stream cipher, small-state stream cipher

中图分类号: 

  • TN918.3
Baidu
map