Fault-propagate pattern based DFA on PRESENT and PRINTcipher |
| |
Authors: | Xinjie Zhao Shize Guo Tao Wang Fan Zhang Zhijie Shi |
| |
Affiliation: | 1. Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang, 050003, Hebei, China 2. The Institute of North Electronic Equipment, Beijing, 100083, China 3. Department of Computer Science and Engineering, University of Connecticut, Storrs, 06269, USA
|
| |
Abstract: | This article proposes an enhanced differential fault analysis (DFA) method named as fault-propagation pattern-based DFA (FPP-DFA). The main idea of FPP-DFA is using the FPP of the ciphertext difference to predict the fault location and the fault-propagation path. It shows that FPP-DFA is very effective on SPN structure block ciphers using bitwise permutation, which is applied to two block ciphers. The first is PRESENT with the substitution-permutation sequence. With the fault model of injecting one nibble fault into the r-2nd round, on average 8 and 16 faults can reduce the key search space of PRESENT-80/128 to 214.7 and 221.1, respectively. The second is PRINTcipher with the permutation-substitution sequence. For the first time, it shows that although the permutation of PRINTcipher is secret key dependent, FPP-DFA still works well on it. With the fault model of injecting one nibble fault into the r-2nd round, 12 and 24 effective faults can reduce the key search space of PRINTcipher-48/96 to 213.7 and 222.8, respectively. |
| |
Keywords: | fault-propagation pattern differential fault analysis bitwise permutation SPN block cipher PRESENT PRINTcipher |
本文献已被 CNKI SpringerLink 等数据库收录! |
|