ZHOU Yongbin, WU Wenling, XU Nannan, et al., “Differential Fault Attack on Camellia,” Chinese Journal of Electronics, vol. 18, no. 1, pp. 13-19, 2009,
Citation: ZHOU Yongbin, WU Wenling, XU Nannan, et al., “Differential Fault Attack on Camellia,” Chinese Journal of Electronics, vol. 18, no. 1, pp. 13-19, 2009,

Differential Fault Attack on Camellia

  • Received Date: 2007-11-01
  • Rev Recd Date: 2008-04-01
  • Publish Date: 2009-02-15
  • Camellia is the final winner of 128-bit blockcipher in NESSIE project, and is also certified as the international IETF standard cipher for SSL/TLS cipher suites.In this study, we present an effcient differential fault attack on Camellia. Ideally, by using our techniques, on average, the complete key of Camellia-128 is recovered with64 faulty ciphertexts while the full keys of Camellia-192and Camellia-256 are retrieved with 96 faulty ciphertexts.Our attack is applicable to generic block ciphers with overall Fiestel structure using a SPN round function.All theseattacks have been successfully put into experimental simulations on a personal computer.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1203) PDF downloads(6939) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return