%0 Journal Article %T Differential Fault Analysis on SHACAL-2
SHACAL-2算法的差分故障攻击 %A Wei Yue-chuan %A Li Lin %A Li Rui-lin %A Li Chao %A
魏悦川 %A 李琳 %A 李瑞林 %A 李超 %J 电子与信息学报 %D 2010 %I %X By using word-oriented fault model and the technique of differential cryptanalysis, the security of SHACAL-2 against differential fault analysis is evaluated. Result shows that SHACAL-2 is not immune to such kind of attack. 8 faulty ciphertexts can recover a sub key of 32 bit on average and 128 faulty ciphertexts are needed to recover all the 512 bit keys. %K Block cipher %K SHACAL-2 %K Differential fault analysis
分组密码 %K SHACAL-2 %K 差分故障攻击 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=1319827C0C74AAE8D654BEA21B7F54D3&jid=EFC0377B03BD8D0EF4BBB548AC5F739A&aid=0C1DD5AA21500B00C84F3E6F3F2D6FBE&yid=140ECF96957D60B2&vid=9971A5E270697F23&iid=0B39A22176CE99FB&sid=3C6F5C97A07587AE&eid=3224764AEAFCF8C2&journal_id=1009-5896&journal_name=电子与信息学报&referenced_num=0&reference_num=14