差別錯誤分析
差別錯誤分析(英語:,或縮寫作DFA,也譯作差分故障攻击)是密碼學領域,尤其是密碼分析學中的一種旁道攻擊(或稱側信道攻擊)。其原理是以不可預料的環境條件誘導加密實現產生錯誤(或偏差),來剖明其内部狀況。
例如,包含嵌入式安全密碼處理器的智能卡可能經受影響其處理器運轉的高溫、超額度的電流或電壓供應、過度的超頻、強電場、強磁場或甚至電離輻射。其處理器可能因物理數據損壞開始輸出錯誤結果,這將有助於利用密码分析推知處理器正在運行的指令或是内部數據狀況。[1][2]
對於資料加密標準和三重資料加密標準而言,約兩百個單翻轉位就足以獲取到其密鑰。[3]差別錯誤分析也已被成功應用于高級加密標準。[4]
参考资料
- Eli Biham, Adi Shamir: The next Stage of Differential Fault Analysis: How to break completely unknown cryptosystems (1996)
- Dan Boneh and Richard A. DeMillo and Richard J. Lipton: On the Importance of Checking Cryptographic Protocols for Faults, Eurocrypt (1997)
- Ramesh Karri, et al.: Fault-Based Side-Channel Cryptanalysis Tolerant Rijndael Symmetric Block Cipher Architecture (2002)
- Christophe Giraud: DFA on AES (2005)
- Xiaofei Guo, et al.: Invariance-based Concurrent Error Detection for Advanced Encryption Standard (2012)
- Rauzy and Guilley: Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA (页面存档备份,存于) (2014) (Open Access version (页面存档备份,存于))
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.