首页 | 本学科首页   官方微博 | 高级检索  
     


Fault-propagate pattern based DFA on PRESENT and PRINTcipher
Authors:Xinjie Zhao  Shize Guo  Tao Wang  Fan Zhang  Zhijie Shi
Affiliation:1. Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang, 050003, Hebei, China
2. The Institute of North Electronic Equipment, Beijing, 100083, China
3. Department of Computer Science and Engineering, University of Connecticut, Storrs, 06269, USA
Abstract:This article proposes an enhanced differential fault analysis (DFA) method named as fault-propagation pattern-based DFA (FPP-DFA). The main idea of FPP-DFA is using the FPP of the ciphertext difference to predict the fault location and the fault-propagation path. It shows that FPP-DFA is very effective on SPN structure block ciphers using bitwise permutation, which is applied to two block ciphers. The first is PRESENT with the substitution-permutation sequence. With the fault model of injecting one nibble fault into the r-2nd round, on average 8 and 16 faults can reduce the key search space of PRESENT-80/128 to 214.7 and 221.1, respectively. The second is PRINTcipher with the permutation-substitution sequence. For the first time, it shows that although the permutation of PRINTcipher is secret key dependent, FPP-DFA still works well on it. With the fault model of injecting one nibble fault into the r-2nd round, 12 and 24 effective faults can reduce the key search space of PRINTcipher-48/96 to 213.7 and 222.8, respectively.
Keywords:fault-propagation pattern  differential fault analysis  bitwise permutation  SPN block cipher  PRESENT  PRINTcipher
本文献已被 CNKI SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号