%0 Journal Article
%T Differential Fault Analysis on SHACAL-2
SHACAL-2算法的差分故障攻击
%A Wei Yue-chuan
%A Li Lin
%A Li Rui-lin
%A Li Chao
%A
魏悦川
%A 李琳
%A 李瑞林
%A 李超
%J 电子与信息学报
%D 2010
%I
%X By using word-oriented fault model and the technique of differential cryptanalysis, the security of SHACAL-2 against differential fault analysis is evaluated. Result shows that SHACAL-2 is not immune to such kind of attack. 8 faulty ciphertexts can recover a sub key of 32 bit on average and 128 faulty ciphertexts are needed to recover all the 512 bit keys.
%K Block cipher
%K SHACAL-2
%K Differential fault analysis
分组密码
%K SHACAL-2
%K 差分故障攻击
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=1319827C0C74AAE8D654BEA21B7F54D3&jid=EFC0377B03BD8D0EF4BBB548AC5F739A&aid=0C1DD5AA21500B00C84F3E6F3F2D6FBE&yid=140ECF96957D60B2&vid=9971A5E270697F23&iid=0B39A22176CE99FB&sid=3C6F5C97A07587AE&eid=3224764AEAFCF8C2&journal_id=1009-5896&journal_name=电子与信息学报&referenced_num=0&reference_num=14