Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things |
Li, Wei
(School of Computer Science and Technology, Donghua University)
Zhang, Wenwen (School of Computer Science and Technology, Donghua University) Gu, Dawu (Department of Computer Science and Engineering, Shanghai Jiao Tong University) Tao, Zhi (School of Computer Science and Technology, Donghua University) Zhou, Zhihong (Shanghai Key Laboratory of Integrate Administration Technologies for Information Security) Liu, Ya (Department of Computer Science and Engineering, University of Shanghai for Science and Technology) Liu, Zhiqiang (Department of Computer Science and Engineering, Shanghai Jiao Tong University) |
1 | P. Kocher, J. Jaffe and B. Jun, "Differential power analysis," in Proc. of 19th Annual Int. Cryptology Conf., pp. 388-397, August 15-19, 1999. |
2 | H. C. Kim and J.-J. Quisquater, "Faults, injection methods, and fault attacks," IEEE Des. Test Comput., vol. 24, no. 6, pp. 544-545, November-December, 2007. DOI |
3 | M. Joye, J. J. Quisquater, S. M. Yen and M. Yung, "Observability analysis-detecting when improved cryptosystems fail," in Proc. of Cryptographer's Track RSA Conf., pp. 17-29, February 18-22, 2002. |
4 | I. C. Lin and C. C. Chang, "Security enhancement for digital signature schemes with fault tolerance in RSA," Inform. Sciences, vol. 177, no. 19, pp. 4031-4039, February, 2007. DOI |
5 | J. Kelsey, B. Schneier, D. Wagner and C. Hall, "Side channel cryptanalysis of product ciphers," in Proc. of 5th European Symp. Research Comp. Security, pp. 97-110, September 16-18, 1998. |
6 | W. Erich and G. Johann, "An 8-bit AVR-based elliptic curve cryptographic RISC processor for the internet of things," in Proc. of 45th Annual Int. Symposium on Microarchitecture, pp. 39-46, December 1-5, 2012. |
7 | K. Zhang, L. Ding and J. Li, "Real time related key attack on Hummingbird-2," KSII T. Internet Inf., vol. 6, no. 8, pp. 1946-1963, August 25, 2012. |
8 | T. Cui and C. Jin, "Finding impossible differentials for Rijndael-like and 3D-like Structures," KSII T. Internet Inf., vol. 7, no. 3, pp. 509-521, March 31, 2013. |
9 | T. Suzaki, K. Minematsu, S. Morioka and E. Kobayashi, "TWINE: a lightweight block cipher for multiple platforms," in Proc. of 19th Int. Conf. Selected Areas in Cryptography, pp. 339-354, August 15-16, 2012. |
10 | F. Karako, H. Demirci and A. E. Harmanc, "Biclique cryptanalysis of LBlock and TWINE," Infor. Processing Letters, vol. 113, no. 12, pp. 423-429, June 30, 2013. DOI |
11 | M. Coban, F. Karako and O. Boztas, "Biclique cryptanalysis of TWINE," in Proc. of 11th Int. Conf. Cryptology Network Security, pp. 43-45, December 12-14, 2012. |
12 | M. Coban, F. Karako and O. Boztas, "Multidimensional meet-in-the-middle attacks on reduced-round TWINE-128," in Proc. of 2nd Int. Workshop on Lightweight Cryptography for Security and Privacy, pp. 55-67, May 6-7, 2013. |
13 | D. Boneh, R. A. DeMillo and R. J. Lipton, "On the importance of checking cryptographic protocols for faults," in Proc. of Int. Conf. Theory Application Cryptographic Techniques, pp. 37-51, May 11-15, 1997. |
14 | D. Boneh, R. A. DeMillo and R. J. Lipton, "On the importance of eliminating errors in cryptographic computations," J. CRYPTOL., vol. 14, no. 2, pp. 101-119, March, 2001. DOI |
15 | E. Biham and A. Shamir, "Differential fault analysis of secret key cryptosystems," in Proc. of 17th Annual Int. Cryptology Conf., pp. 513-525, August 15-19, 1997. |
16 | G. Bertoni, L. Breveglieri, I. Koren, P. Maistri and V. Piuri, "Error analysis and detection procedures for a hardware implementation of the Advanced Encryption Standard," IEEE T. Comput., vol. 52, no. 4, pp. 492-505, April 2, 2003. DOI |
17 | P. Dusart, G. Letourneux and O. Vivolo, "Differential fault analysis on A.E.S," in Proc. of 1st Int. Conf. Applied Cryptography and Network Security, pp. 293-306, October 16-19, 2003. |
18 | A. Moradi, M. T. M. Shalmani and M. Salmasizadeh, "A generalized method of differential fault attack against AES cryptosystem," in Proc. of 8th Int. Workshop on Cryptographic Hardware and Embedded Systems, pp. 91-100, October 10-13, 2006. |
19 | P. Gilles and J. J. Quisquater, "A differential fault attack technique against SPN structures, with application to the AES and KHAZAD," in Proc. of 5th Int. Workshop on Cryptographic Hardware and Embedded Systems, pp. 77-88, September 8-10, 2003. |
20 | C. Christophe, G. Benedikt and V. Ingrid, "Fault analysis study of IDEA," in Proc. of Cryptographers' Track at the RSA Conf., pp. 247-287, April 8-11, 2008. |
21 | W. Li, D. Gu and J. Li, "Differential fault analysis on the ARIA algorithm," Inform. Sciences, vol. 178, no. 19, pp. 3727-3737, October 1, 2008. DOI |
22 | P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Proc. of 16th Annual Int. Cryptology Conf., pp. 104-113, August 18-22, 1996. |
23 | C. Giraud, "DFA on AES," in Proc. of 4th Int. Conf. Advanced Encryption Standard, pp. 27-41, May 10-12, 2004. |
![]() |