<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
Abstract A fault attack of SMS4 based on internal collision is proposed. The method assumes that the attacker can attack under the condition of selecting plaintext, and adopts the byte-oriented random fault model to successfully recover the original key by injecting the fault in the first few rounds of the encryption algorithm of the SMS4. Theoretical analysis and experimental results show that the 60 fault injections can successfully recover the original key of the SMS4, with a probability of over 99%. If the attacker can control the location of fault injection, then only 16 fault injections are needed to successfully recover the original key of the SMS4. In general, 30 to 40 fault injections can successfully restore the original key.
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |