Xian Army Command College

Fengcheng, China

Xian Army Command College

Fengcheng, China

Time filter

Source Type

Wei Y.-C.,National University of Defense Technology | Li L.,National University of Defense Technology | Li L.,Xian Army Command College | Li R.-L.,National University of Defense Technology | And 2 more authors.
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | Year: 2010

By using word-oriented fault model and the technique of differential cryptanalysis, the security of SHACAL-2 against differential fault analysis is evaluated. Result shows that SHACAL-2 is not immune to such kind of attack. 8 faulty ciphertexts can recover a sub key of 32 bit on average and 128 faulty ciphertexts are needed to recover all the 512 bit keys.

Loading Xian Army Command College collaborators
Loading Xian Army Command College collaborators