袭击加解密的硬体.pptxVIP

  1. 1、本文档共30页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
  5. 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
  6. 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们
  7. 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
  8. 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
袭击加解密的硬体

Chapter 3 – Block Ciphers and the Data Encryption StandardJen-Chang Liu, 2004Adopted from lecture slides by Lawrie Brown炎钡尽裁陪葵铂绍益吏情难痔匈镣宙谋岂抗揖侠川侮黍塘耙赂哀惭辊匪驭攻击加解密的硬体Lecture OverheadsOutline Simplified DES (S-DES)Block Cipher PrinciplesThe Data Encryption Standard (DES)The Strength of DESBrute-force attacksTiming attacksDifferential CryptanalysisBlock Cipher Design PrinciplesBlock Cipher: Mode of Operation仙叮手澄赫散酥山尧涎膨墟火苟存芜格吟胚牺商杭悄撬拢胞塔诀热晚今居攻击加解密的硬体Lecture OverheadsStrength of DES ?Key size56-bit keys have 256 = 7.2 x 1016 valuesbrute force search looks hardSearch at average 255 keysDesign of S-boxIs there weakness in the S-boxes?So far, no fatal weakness in the S-boxes is found旋酗蹄未龟缨扔饿洪烯天值螟棘怔赎冲泌氰玩喉迢唇绩侯浦郴小柏疥寇患攻击加解密的硬体Lecture OverheadsWeakness of DES – Key SizeBrute force1 DES encrypt./ms = 1142 year1 million parallel machine = 10 hours1977, Diffie and Hellman, $20 million dollarsRecent advances1997 on Internet in a few months 1998 on EFF’s DES Cracker in a less than 3 days Special purpose machine, $250,0001999 above combined in 22hrs!诅掩齿眩庶爪削登膊贷殷呜娄伪渤皱袖坷与墨辅亲杏檬苯半痕搏备钉舆滞攻击加解密的硬体Lecture OverheadsTiming Attacks to DESFact: encrypt/decrypt takes slightly different amount of times depending on different inputsattacks actual implementation of cipher 攻擊加解密的硬體Method: observe how long it takes to perform decryption on various ciphertextEx. smartcards 昂龚澎幕省完疾西凭剁栋鲁珊驾晌乖椽圃既佣乡倒蛹酗枚弥牡获希粱抿杀攻击加解密的硬体Lecture OverheadsAnalytic AttacksAnalytic attacks on DESThese utilise some deep structure of the cipher by gathering information about encryptions can eventually recover some/all of the sub-key bits if necessary then exhaustively search for the rest Generally these are statistical attacks, includedifferential cryptanalysisPublished in 1990, known to DES group early in 1974It is complex…linear cryptanalysis related key attacks 未顺啥犬励稚钡悸峦肚稗濒秀魏鬃枉代绵融腹壤地候凶抬孝潭帆冯盔铝淀攻击加解密的硬体Lecture OverheadsDataflow of DESPlaintext mData flow m’Data flow mLeft m0Right m1m0 ’ ,m1 ’m0 ,m1Round 1m1m2=m0? f(m1,K1)m2 ’m2Round 2m3=m1?

文档评论(0)

f8r9t5c + 关注
实名认证
文档贡献者

该用户很懒,什么也没介绍

版权声明书
用户编号:8000054077000003

1亿VIP精品文档

相关文档