Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.4.17

A Differential Fault Attack on Block Cipher SEED  

Jeong, Ki-Tae (Center for Information Security Technologies, Korea University)
Sung, Jae-Chul (Department of Mathematics, University of Seoul)
Hong, Seok-Hie (Center for Information Security Technologies, Korea University)
Abstract
A differential fault attack(DFA) is one of the most efficient side channel attacks on block ciphers. Almost all block ciphers, such as DES, AES, ARIA, SEED and so on., have been analysed by this attack. In the case of the known DFAs on SEED, the attacker induces permanent faults on a whole left register of round 16. In this paper, we analyse SEED against DFA with differential characteristics and addition-XOR characteristics of the round function of SEED. The fault assumption of our attack is that the attacker induces 1-bit faults on a particular register. By using our attack, we can recover last round keys and the master key with about $2^{32}$ simple arithmetic operations. It can be simulated on general PC within about a couple of second.
Keywords
Differential fault attack; Block cipher; SEED;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Korea Information Security Agencry, "A Design and Analysis of 128-bit Symmetric Block Cipher SEED," 1999. Available at http://www.kisa.or.kr/kisa/seed/jsp/seed_1010.jsp
2 ISO/IEC 18033-3, "Information technology-Security techniques-Encryption algorithms - Part 3: Block Ciphers," 2005.
3 W. Li, D. Gu, and J. Li, "Differential Fault Analysis on the ARIA Algorithm," Information Science, Vol. 178, Issue. 19, pp. 3727-3737, Elsevier, 2008.   DOI   ScienceOn
4 H. Lipmaa and S. Moriai, "Efficient Algorithms for Computing Differential Properties of Addition." FSE'01, LNCS 2355, pp. 336-350, Springer-Verlag, 2002.
5 H. Yanami and T. Shimoyama, "Differential Cryptanalysis of a Reduced-Round SEED," SCN'02, LNCS 2576, pp. 186-198, Springer-Verlag, 2002.
6 H. Yoo, C. Kim, J. Ha, S. Moon, and I. Park, "Side Channel Cryptanalysis on SEED," WISA'04, LNCS 3325, pp. Springer-Verlag, 2004.
7 D. Boneh, R. DeMillio and R. Lipton, "On the importance of checking cryptographic protocols for faults," Eurocrypt'97, LNCS 1233, pp. 37-51, Springer-Verlag, 1997.
8 P. Dusart, G. Letourneux, and O. Vivolo, "Differntial Fault Attack on AES," ACNS'03, LNCS 2846, pp. 293-306, Springer-Verlag, 2003.
9 P. Kocher, "Timing attacks on implementation of Diffie-Hellman." Crypto'96, LNCS 1109, pp. 104-113, Springer-Verlag, 1996.
10 L. Hemme, ''A Differential Faut Aanalysis against Early Rounds of (Triple)-DES," CHES'04, LNCS 3156, pp. 254-267, Springer- Verlag, 2004.
11 하재철, 김창균, 문상재, 박일환, "SEED에 대한 오류 분석 공격", 한국정보보호학회 동계정보보호학술대회 논문집(CISC-W'04), pp. 39-44, 2004년 12월.
12 E. Biham and A. Shamir, "Differential Faut Analysis of Secret Key Cryptosystems," Crypto'97, LNCS 1294, pp. 513-525, Springer-Verlag, 1997.
13 E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystem," Journal of Cryptology, Vol. 4, No.1, pp. 3-72, Springer-Verlag, Jan. 1991.   DOI