针对Decimv2流密码现有故障攻击方法未有效利用Decimv2非线性布尔函数差分特性导致攻击复杂度高的问题,提出一种改进的差分故障攻击方法,该方法充分利用Decimv2非线性布尔函数的差分特性,通过在Decimv2线性反馈移位寄存器LFSR中注入面向比特的随机故障,构建算法内部状态的线性方程组,并对方程组进行求解恢复初始密钥K.实验结果表明,平均2个故障注入可恢复全部80比特初始密钥,所需密钥流为144比特,整个攻击计算复杂度由现有的O(242.5)减小为O(238.95).此外,该攻击方法可以为其他流密码差分故障攻击提供一定的参考.
According to the drawbacks of the existing fault attacks against Decivm^v2 , an improved fault attack is proposed, which gets fault locations and builds linear equations of Decivm^v2 internal states to figure them out by making full use of the differential properties of the nonlinear Boolean functions. Experimental results show that the attack can recover the whole 80-bit initial key of Decivm^v2 by only 2 fault injections and 144 bits keystreams averagely,the time complexity was reduced evidently from O(2^42.5 ) to O(2^38.95 ). Our attack can provide some ideas on other stream cipher.