Timing and hamming weight attacks on minimal cost encryption scheme

来源 :中国邮电高校学报(英文版) | 被引量 : 0次 | 上传用户:mkunaini520
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption scheme is presented in this article. In the attack, timing information on encryption processing is used to select and collect effective plaintexts for attack. Then the collected plaintexts are utilized to infer the expanded key differences of the secret key, from which most bits of the expanded secret key are recovered. The remaining bits of the expanded secret key are deduced by the correlations between Hamming weight values of the input of the S-boxes in the first-round. Finally, from the linear relation of the encryption time and the secret keys Hamming weight, the entire 56 bits of the secret key are thoroughly recovered. Using the attack, the minimal cost encryption scheme can be broken with 223 known plaintexts and about 221 calculations at a success rate a>99%. The attack has lower computing complexity, and the method is more effective than other previous methods.
其他文献
对三种重壤土上鱼腥草Houttuynia cordata干物质积累特性研究结果表明,全株干物质积累变化曲线不尽相同。在试验期内,粘粉质和粉砂质重壤上鱼腥草干物质积累曲线均表现为S型,
目的 观察自体游离骨-骨膜复合组织移植修复关节软骨缺损的组织形态学演变过程及其分期,探讨骨膜演化为软骨的影响因素,新生软骨退变的主要影响因素.方法 将健康家兔30只随机
试验结果表明:施药后1d,啶虫脒·烯唑醇WP(可湿性粉剂)3000、4000、5000、6000倍液4种剂量对小麦蚜虫的防效分别为82.25%、76.05%、74.13%、64.01%,3%啶虫脒EC(乳油)2000倍、12.5%
以山东省德州市为试验地点 ,对用TL Fe根系输液法矫正苹果缺铁黄叶病的效果进行了研究 ,结果表明 :TL1根系输液 6d后 ,苹果叶片全铁含量比ck增加 10 4 16 % ,活性铁含量增加
以用一定浓度的苦楝果提取物处理的构树枝条作为天牛的食物 ,研究了其对桑天牛产卵及卵孵化的影响。在室温下用苦楝果提取物 5 0 0mg/kg处理枝条 ,处理组天牛 ( 7对 )在1 5天
通过测定不同施肥措施下棉田土壤微生物量及微生物活性的动态变化,探讨了不同施肥措施对棉田土壤的培肥效应,结果表明,有机肥合理配施N、P、K化肥,可以促进土壤微生物量显著
在对云南分布的醉鱼草属观赏资源系统调查和资料整理的基础上,研究了该属植物在云南的地理分布规律及25种(包括变种)醉鱼草的观赏性状,包括花、叶、香气等观赏特征及其开花期
1日龄艾维茵肉仔鸡300只,随机分为5组,每组3重复,自由采食以玉米、淀粉、葡萄糖和大豆分离蛋白为主的日粮,日粮中分别添加0、6.5、11、55和100mg/kg铜,饮用去离子水,分别于1
In tracking test,discharge is a complicated process and comparative tracking index(CTI)has wide variation.To evaluate tracking resistance,the chaos analysis of
The mismatch between the structured peer-to-peer (P2P) overlay network, which is based on Hashing, and the actual physical network, leads to query repeatedly pa