Timing and hamming weight attacks on minimal cost encryption scheme

来源 :The Journal of China Universities of Posts and Telecommunica | 被引量 : 0次 | 上传用户:helen_fu
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption scheme is presented in this article. In the attack, timing information on encryption processing is used to select and collect effective plaintexts for attack. Then the collected plaintexts are utilized to infer the expanded key differences of the secret key, from which most bits of the expanded secret key are recovered. The remaining bits of the expanded secret key are deduced by the correlations between Hamming weight values of the input of the S-boxes in the first-round. Finally, from the linear relation of the encryption time and the secret key’s Hamming weight, the entire 56 bits of the secret key are thoroughly recovered. Using the attack, the minimal cost encryption scheme can be broken with 2 23 known plaintexts and about 2 21 calculations at a success rate a > 99%. The attack has lower computing complexity, and the method is more effective than other previous methods. The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption scheme is presented in this article. In the attack, timing information on encryption processing is used to select and collect effective plaintexts for attack. Then the collected plaintexts the remaining bits of the expanded secret key are deduced by the correlations between Hamming weight values ​​of the input of the S-boxes in the first-round. Finally, from the linear relation of the encryption time and the secret key’s Hamming weight, the entire 56 bits of the secret key are thoroughly recovered. Using the attack, the minimal cost encryption scheme can be broken with 2 23 known plaintexts and about 2 21 calculations at a success rate a> 99%. The attack has lower computing complexity, and the method is more effective than other previous m ethods.
其他文献
报道了用盐酸、氢氟酸、高氯酸溶样,以稀盐酸为介质,空气─乙炔火焰原子吸收法连续测定地质样品中的Cu、Pb、Zn、Fe、Co、Ni、Cr,Li、Mn、Rb、K及Na,方法简单快速。并讨论了仪器工作条件和主要干扰因素的
常言道:事在人为。无论市场情况如何,我们都不能坐以待毙,都需要找出相应的办法解决问题。市场形势好,大家的工作风风火火、如火如荼;市场形势不好,大家也依然有很多的工作要
正伴着革命老区人民的憧憬和梦想,省十二届人大常委会第三次会议高票通过了《湖北省促进革命老区发展条例》,这是省人大常委会立法实行"两审三通过"后制定的第一部地方性法规
重要的观赏种在观赏领域中,至今我国园林花卉中常见到的主要是下列各种: 1.‘银圣’鼠尾草(S.argentea‘Silver Sage’)这是近年由外国引入的以观叶为主的鼠尾草。二年生草
此柽柳桩得于1995年,经10年修剪、养护,现已基本成型。柽柳的养护,秋冬季在室外最低气温-4℃~7℃时,移入室内过冬。此期间注意适当补水,不要干透,翌年3月中旬移出室外进行正
前几年去云南出差,带回一些蕙兰、墨兰、春兰等兰草。回来后,买了袋装的兰花土,把兰草一一栽上。考虑到这些兰草长期生长在温暖潮湿的南方,现在落户到内蒙古,对气候的干燥一
数值模拟了IP-over-WDM光网络中基于频移键控/幅移键控(FSK/ASK)正交调制的光标记信号/净荷的传输性能。结果表明,ASK净荷的传输同时受到调制器消光比、接收光功率及光纤色散
医学英语教学在我国高等医药院校中占有很重要的位置。我国医疗卫生事业的不断发展和对外开放,追切需要越来越多的医术精练的医务人员投入到四化建设中去。这是时代赋予我们
目的掌握宛城区碘缺乏病防治现状和病情消长情况,评价全区实施以食盐加碘为主的综合防治措施效果,为实现“十二五”规划持续消除碘缺乏病危害目标提供科学依据。方法 2011年1
株形娇小、叶色漂亮的王妃雷神,还有它的斑锦变异品种,应该说是目前比较受欢迎的多肉植物。它们不光好看,而且容易栽培,自然而然地就成了爱好者们追捧的新宠。 Petite shap