Browse > Article
http://dx.doi.org/10.13089/JKIISC.2012.22.1.33

Improved Differential Fault Analysis on Block Cipher PRESENT-80/128  

Park, Se-Hyun (Center for Information Security Technologies, Korea University)
Jeong, Ki-Tae (Center for Information Security Technologies, Korea University)
Lee, Yu-Seop (Center for Information Security Technologies, Korea University)
Sung, Jae-Chul (Department of Mathematics, University of Seoul)
Hong, Seok-Hie (Center for Information Security Technologies, Korea University)
Abstract
A differential fault analysis(DFA) is one of the most important side channel attacks on block ciphers. Most block ciphers, such as DES, AES, ARIA, SEED and so on., have been analysed by this attack. PRESENT is a 64-bit block cipher with 80/128-bit secret keys and has a 31-round SP-network. So far, several DFAs on PRESENT have been proposed. These attacks recovered 80, 128-bit secret keys of PRESENT with 8~64 fault injections. respectively. In this paper, we propose an improved DFA on PRESENT-80/128. Our attack can reduce the complexity of exhaustive search of PRESENT-80(resp. 128) to on average 1.7(resp. $2^{22.3}$) with 2(resp. 3) fault injections, From these results, our attack results are superior to known DFAs on PRESENT.
Keywords
Side channel analysis; Differtial fault analysis; block cipher PRESENT;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 E. Biham, A. Shamir, "Differential faut analysis of secret key cryptosystems," Advances in Cryptology, CRYPTO'97, LNCS 1294, pp. 513-525, 1997.
2 P. Dusart, G. Letourneux, O. Vivolo, "Differntial fault attack on AES," Applied Cryptography and Network Security, ACNS'03, LNCS 2846, pp. 293-306, 2003.
3 L. Hemme, "A differential faut analysis against early rounds of (triple)-DES," Workshop on Cryptographic Hardware and Embedded Systems, CHES'04, LNCS 3156, pp. 254-267, 2004.
4 W. Li, D. Gu, J. Li, "Differential fault analysis on the ARIA algorithm," Information Sciences, Vol. 178, no. 19, pp. 3727-3737, Oct. 2008.   DOI
5 정기태, 성재철, 홍석희, "블록 암호 SEED에 대한 차분 오류 공격," 정보보보학회논문지, 제 20권, 제 4호, pp. 17-24, 2010년 8월.
6 A. Bogdanov, L. Knudsen, G. Leander, C. Paar, "PRESENT: an ultra-light-weight block cipher,". Workshop on Cryptographic Hardware and Embedded Systems, CHES'07, LNCS 4727, pp. 450-466, Springer-Verlag, 2007.
7 J. Li, D. Gu, "Differential fault analysis on PRESENT," CHINACRYPT'09, pp.3-13. Nov. 2009.
8 G. Wang, S. Wang, "Differential fault analysis on PRESENT key schedule," CIS'10, pp.362-366. Dec, 2010.
9 X. Zhao, T. Wang and S. Guo, "Fault propagate pattern based DFA on SPN structure block ciphers using bitwise permutation with Application to PRESENT and PRINTcipher," ePrint 2011-086, Feb. 2011.