Browse > Article
http://dx.doi.org/10.13089/JKIISC.2011.21.2.91

A Round Reduction Attack on Triple DES Using Fault Injection  

Choi, Doo-Sik (Hoseo University)
Oh, Doo-Hwan (Hoseo University)
Bae, Ki-Seok (Kyungpook National University)
Moon, Sang-Jae (Kyungpook National University)
Ha, Jae-Cheol (Hoseo University)
Abstract
The Triple Data Encryption Algorithm (Triple DES) is an international standard of block cipher, which composed of two encryption processes and one decryption process of DES to increase security level. In this paper, we proposed a Differential Fault Analysis (DFA) attack to retrieve secret keys using reduction of last round execution for each DES process in the Triple DES by fault injections. From the simulation result for the proposed attack method, we could extract three 56-bit secret keys using exhaustive search attack for $2^{24}$ candidate keys which are refined from about 9 faulty-correct cipher text pairs. Using laser fault injection experiment, we also verified that the proposed DFA attack could be applied to a pure microprocessor ATmega 128 chip in which the Triple DES algorithm was implemented.
Keywords
Triple-DES; Differential Fault Analysis Attack; Round Reduction;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 W. Li, D. Gu, J. Li, "Differential Fault Analysis on the ARIA Algorithm," Information Science. Vol. 178, Issue. 19, pp. 3727-3737, 2008.   DOI
2 NIST, "Data Encryption Standard(DES)," NIST FIPS PUB 46-3, 1999.
3 L. Hemme, "A Differential Fault Analysis Against Early Rounds of (Triple)-DES," CHES'04, LNCS 3156, pp. 254-267, 2004.
4 C. R. Moratelli, E. Cota, M. S. Lubaszawski, "A Cryptography Core Tolerant to DFA Fault Attacks," SBCCI-2006, pp. 190-195, 2006.
5 H. Choukri and M. Tunstall, "Round reduction using faults," FDTC'05, pp. 13-24. 2005.
6 NIST, "Recommendation for the Triple Data Encryption Algorithm(TDEA) Block Cipher," NIST FIPS PUB 800-67, 2008.
7 Atmel사 홈페이지, http://www.atmel.com/ atmel/acrobat/doc2467.pdf
8 박제훈, 배기석, 오두환, 문상재, 하재철, "AES에대한 반복문 오류 주입 공격," 한국정보보호학회논문지, 20(6), pp. 59-65, 2010년 12월.
9 E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," CRYPTO'97, LNCS 1294, pp. 513-525, 1997.
10 D. Boneh, R. DeMillo, and R. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults," EUROCRYPTO' 97, LNCS 1233, pp. 37-51, 1997.
11 National Institute of Standards and Technology, "Advanced Encryption Standards," NIST FIPS PUB 197, 2001.
12 G. Piret and J. Quisquater, "A differential fault attack technique against SPN structures, with application to the AES and KHAZAD," CHES'03, LNCS 2779, pp. 77-88, 2003.
13 C. Giraud, "DFA on AES," Advanced Encryption Standard-AES'04, LNCS 3373, pp. 27-41, 2005.
14 C. Kim and J. Quisquater, "New Differential Fault Analysis on AES Key Schedule: Two Faults are enough,"CARDIS'08, LNCS 5189, pp. 48-60, 2008.