Browse > Article
http://dx.doi.org/10.3837/tiis.2015.02.018

Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things  

Li, Wei (School of Computer Science and Technology, Donghua University)
Zhang, Wenwen (School of Computer Science and Technology, Donghua University)
Gu, Dawu (Department of Computer Science and Engineering, Shanghai Jiao Tong University)
Tao, Zhi (School of Computer Science and Technology, Donghua University)
Zhou, Zhihong (Shanghai Key Laboratory of Integrate Administration Technologies for Information Security)
Liu, Ya (Department of Computer Science and Engineering, University of Shanghai for Science and Technology)
Liu, Zhiqiang (Department of Computer Science and Engineering, Shanghai Jiao Tong University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.2, 2015 , pp. 793-810 More about this Journal
Abstract
The TWINE is a new Generalized Feistel Structure (GFS) lightweight cryptosystem in the Internet of Things. It has 36 rounds and the key lengths support 80 bits and 128 bits, which are flexible to provide security for the RFID, smart cards and other highly-constrained devices. Due to the strong attacking ability, fast speed, simple implementation and other characteristics, the differential fault analysis has become an important method to evaluate the security of lightweight cryptosystems. On the basis of the 4-bit fault model and the differential analysis, we propose an effective differential fault attack on the TWINE cryptosystem. Mathematical analysis and simulating experiments show that the attack could recover its 80-bit and 128-bit secret keys by introducing 8 faulty ciphertexts and 18 faulty ciphertexts on average, respectively. The result in this study describes that the TWINE is vulnerable to differential fault analysis. It will be beneficial to the analysis of the same type of other iterated lightweight cryptosystems in the Internet of Things.
Keywords
Internet of Things; Cryptanalysis; Lightweight Cryptosystem; Differential Fault Analysis; TWINE;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 P. Kocher, J. Jaffe and B. Jun, "Differential power analysis," in Proc. of 19th Annual Int. Cryptology Conf., pp. 388-397, August 15-19, 1999.
2 H. C. Kim and J.-J. Quisquater, "Faults, injection methods, and fault attacks," IEEE Des. Test Comput., vol. 24, no. 6, pp. 544-545, November-December, 2007.   DOI
3 M. Joye, J. J. Quisquater, S. M. Yen and M. Yung, "Observability analysis-detecting when improved cryptosystems fail," in Proc. of Cryptographer's Track RSA Conf., pp. 17-29, February 18-22, 2002.
4 I. C. Lin and C. C. Chang, "Security enhancement for digital signature schemes with fault tolerance in RSA," Inform. Sciences, vol. 177, no. 19, pp. 4031-4039, February, 2007.   DOI
5 J. Kelsey, B. Schneier, D. Wagner and C. Hall, "Side channel cryptanalysis of product ciphers," in Proc. of 5th European Symp. Research Comp. Security, pp. 97-110, September 16-18, 1998.
6 W. Erich and G. Johann, "An 8-bit AVR-based elliptic curve cryptographic RISC processor for the internet of things," in Proc. of 45th Annual Int. Symposium on Microarchitecture, pp. 39-46, December 1-5, 2012.
7 K. Zhang, L. Ding and J. Li, "Real time related key attack on Hummingbird-2," KSII T. Internet Inf., vol. 6, no. 8, pp. 1946-1963, August 25, 2012.
8 T. Cui and C. Jin, "Finding impossible differentials for Rijndael-like and 3D-like Structures," KSII T. Internet Inf., vol. 7, no. 3, pp. 509-521, March 31, 2013.
9 T. Suzaki, K. Minematsu, S. Morioka and E. Kobayashi, "TWINE: a lightweight block cipher for multiple platforms," in Proc. of 19th Int. Conf. Selected Areas in Cryptography, pp. 339-354, August 15-16, 2012.
10 F. Karako, H. Demirci and A. E. Harmanc, "Biclique cryptanalysis of LBlock and TWINE," Infor. Processing Letters, vol. 113, no. 12, pp. 423-429, June 30, 2013.   DOI
11 M. Coban, F. Karako and O. Boztas, "Biclique cryptanalysis of TWINE," in Proc. of 11th Int. Conf. Cryptology Network Security, pp. 43-45, December 12-14, 2012.
12 M. Coban, F. Karako and O. Boztas, "Multidimensional meet-in-the-middle attacks on reduced-round TWINE-128," in Proc. of 2nd Int. Workshop on Lightweight Cryptography for Security and Privacy, pp. 55-67, May 6-7, 2013.
13 D. Boneh, R. A. DeMillo and R. J. Lipton, "On the importance of checking cryptographic protocols for faults," in Proc. of Int. Conf. Theory Application Cryptographic Techniques, pp. 37-51, May 11-15, 1997.
14 D. Boneh, R. A. DeMillo and R. J. Lipton, "On the importance of eliminating errors in cryptographic computations," J. CRYPTOL., vol. 14, no. 2, pp. 101-119, March, 2001.   DOI
15 E. Biham and A. Shamir, "Differential fault analysis of secret key cryptosystems," in Proc. of 17th Annual Int. Cryptology Conf., pp. 513-525, August 15-19, 1997.
16 G. Bertoni, L. Breveglieri, I. Koren, P. Maistri and V. Piuri, "Error analysis and detection procedures for a hardware implementation of the Advanced Encryption Standard," IEEE T. Comput., vol. 52, no. 4, pp. 492-505, April 2, 2003.   DOI
17 P. Dusart, G. Letourneux and O. Vivolo, "Differential fault analysis on A.E.S," in Proc. of 1st Int. Conf. Applied Cryptography and Network Security, pp. 293-306, October 16-19, 2003.
18 A. Moradi, M. T. M. Shalmani and M. Salmasizadeh, "A generalized method of differential fault attack against AES cryptosystem," in Proc. of 8th Int. Workshop on Cryptographic Hardware and Embedded Systems, pp. 91-100, October 10-13, 2006.
19 P. Gilles and J. J. Quisquater, "A differential fault attack technique against SPN structures, with application to the AES and KHAZAD," in Proc. of 5th Int. Workshop on Cryptographic Hardware and Embedded Systems, pp. 77-88, September 8-10, 2003.
20 C. Christophe, G. Benedikt and V. Ingrid, "Fault analysis study of IDEA," in Proc. of Cryptographers' Track at the RSA Conf., pp. 247-287, April 8-11, 2008.
21 W. Li, D. Gu and J. Li, "Differential fault analysis on the ARIA algorithm," Inform. Sciences, vol. 178, no. 19, pp. 3727-3737, October 1, 2008.   DOI
22 P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Proc. of 16th Annual Int. Cryptology Conf., pp. 104-113, August 18-22, 1996.
23 C. Giraud, "DFA on AES," in Proc. of 4th Int. Conf. Advanced Encryption Standard, pp. 27-41, May 10-12, 2004.