Wei Y.-C.,National University of Defense Technology |
Li L.,National University of Defense Technology |
Li L.,Xian Army Command College |
Li R.-L.,National University of Defense Technology |
And 2 more authors.
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | Year: 2010
By using word-oriented fault model and the technique of differential cryptanalysis, the security of SHACAL-2 against differential fault analysis is evaluated. Result shows that SHACAL-2 is not immune to such kind of attack. 8 faulty ciphertexts can recover a sub key of 32 bit on average and 128 faulty ciphertexts are needed to recover all the 512 bit keys.