Abstract
We investigate a technique that needs to apply multiple random faults to the same target location and compare the impact of these faults on the fault-free and faulty output to recover specific secret variable. A mix of random effective and ineffective faults is considered in our analysis. In this paper, we apply these random faults to CLX-128, a first round candidate in the National Institute of Standards and Technology lightweight cryptography project, to recover the secret key of the cipher. We also investigate the bit-flipping fault applications to CLX-128. We show that both of these fault models can be applied to CLX-128 to recover its internal state. The application of the random fault model to CLX-128 requires 134 faulty queries to recover certain state bits, whereas the bit-flipping fault model requires 54 faulty queries to recover certain state bits. The remaining state bits are recovered by solving a system of linear equations. The complexity of the attacks is \(2^{36}\). In our applications, the random fault model requires comparatively large number of faults, but the underlying assumptions of the random fault model are less strict and hence more practical, as the adversary does not need to have a prior knowledge on the impact of the fault.
Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
Wu, H., Huang, T.: CLX: a family of lightweight authenticated encryption algorithms. NIST Lightweight Cryptography (LWC) Project (2019). https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/CLX-spec.pdf
NIST Lightweight Cryptography Project (2019). https://csrc.nist.gov/projects/lightweight-cryptography
Dey, P., Rohit, R.S., Sarkar, S., Adhikari, A.: Differential fault analysis on Tiaoxin and AEGIS family of ciphers. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications—SSCC 2016, Communications in Computer and Information Science, vol. 625, pp. 74–86, Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-2738-3
Wong, K., Bartlett, H., Simpson, L., Dawson, E.: Differential random fault attacks on certain CAESAR stream ciphers. In: Seo, J. (eds) Information Security and Cryptology—ICISC 2019. Lecture Notes in Computer Science, vol. 11975, pp. 297–315, Springer, Cham (2020). https://doi.org/10.1007/978-3-030-40921-0
Bartlett, H., Dawson, E., Mahri, H.A., Salam, M.I., Simpson, L., Wong, K.K.-H.: Random fault attacks on a class of stream ciphers. Secur. Commun. Netw. 2019, 12, 1680263 (2019). https://doi.org/10.1155/2019/1680263
Salam, I., Mahri, H.Q., Simpson, L., Bartlett, H., Dawson, E., Wong, K.K.: Fault attacks on Tiaoxin-346. In: Proceedings of the the Australasian Computer Science Week—ASCW 2018, ACM Digital Library, pp. 1–9 (2018). https://doi.org/10.1145/3167918.3167940
Salam, I., Law, K.Y., Xue, L., Yau, W.C.: Differential fault based key recovery attacks on TRIAD. In: Hong, D. (eds.) Information Security and Cryptology—ICISC 2020. Lecture Notes in Computer Science, vol. 12593, pp. 273–287, Springer, Cham (2021). https://doi.org/10.1007/978-3-030-68890-5
CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. https://competitions.cr.yp.to/index.html
Sarkar, S., Dey, P., Adhikari, A., Maitra, S.: Probabilistic signature based generalized framework for differential fault analysis of stream ciphers. Cryptogr. Commun. 9, 523–543 (2017). https://doi.org/10.1007/s12095-016-0197-2
Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the grain family of stream ciphers. In: Prouff, E., Schaumont, P. (eds) Cryptographic Hardware and Embedded Systems—CHES 2012. CHES 2012. Lecture Notes in Computer Science, vol. 7428, pp. 122–139, Springer, Berlin (2012). https://doi.org/10.1007/978-3-642-33027-8_8
Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the Grain family under reasonable assumptions. In: Galbraith, S., Nandi, M. (eds.) Progress in Cryptology—INDOCRYPT 2012. Lecture Notes in Computer Science, vol. 7668, pp. 191–208, Springer, Berlin (2012). https://doi.org/10.1007/978-3-642-34931-7
Banik, S., Maitra, S.: A differential fault attack on MICKEY 2.0. In: Bertoni, G., Coron, JS. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2013. Lecture Notes in Computer Science, vol. 8086, pp. 215–232, Springer, Berlin. https://doi.org/10.1007/978-3-642-40349-1
Banik, S., Maitra, S., Sarkar, S.: Improved differential fault attack on MICKEY 2.0. J. Cryptogr. Eng. 5, 13–29 (2015). https://doi.org/10.1007/s13389-014-0083-9
Dey, P., Chakraborty, A., Adhikari, A., Mukhopadhyay, D.: Improved practical differential fault analysis of Grain-128. In: 2015 Design, Automation & Test in Europe Conference & Exhibition—DATE 2015. pp. 459–464, IEEE (2015). https://doi.org/10.7873/DATE.2015.0921
Sarkar, S., Banik, S., Maitra, S.: Differential fault attack against Grain family with very few faults and minimal assumptions. IEEE Trans. Comput. 64(6), 1647–1657 (2015). https://doi.org/10.1109/TC.2014.2339854
Salam, I., Simpson, L., Bartlett, H., Dawson, E., Wong, K.K.-H.: Fault attacks on the authenticated encryption stream cipher MORUS. Cryptography 2(1), 4 (2018). https://doi.org/10.3390/cryptography2010004
Mége, A.: Slide attack on CLX-128. NIST Lightweight Cryptography Workshop (2019). https://csrc.nist.gov/CSRC/media/Events/lightweight-cryptography-workshop-2019/documents/papers/slide-attack-on-clx-128-lwc2019.pdf
Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski, B.S., Ko,ç ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems—CHES 2002. Lecture Notes in Computer Science, vol. 2523, pp. 2–12, Springer, Berlin (2003). https://doi.org/10.1007/3-540-36400-5
Schmidt, J., Herbst, C.: A practical fault attack on square and multiply. In: 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 53–58 (2008). https://doi.org/10.1109/FDTC.2008.10
Hutter, M., Schmidt, J.: The temperature side channel and heating fault attacks. In: Francillon, A., Rohatgi, P. (eds.) Smart Card Research and Advanced Applications—CARDIS 2013. Lecture Notes in Computer Science, vol. 8419, pp. 219–235 Springer, Cham (2014). https://doi.org/10.1007/978-3-319-08302-5
Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056–3076 (2012). https://doi.org/10.1109/JPROC.2012.2188769
Clavier, C.: Secret external encodings do not prevent transient fault analysis. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2007. Lecture Notes in Computer Science, vol. 4727, pp. 181–194, Springer, Berlin (2007). https://doi.org/10.1007/978-3-540-74735-2
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the Sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds) Selected Areas in Cryptography—SAC 2011. Lecture Notes in Computer Science, vol. 7118, pp. 320–337, Springer, Berlin (2012). https://doi.org/10.1007/978-3-642-28496-0
Stein, W. et al.: Sage Mathematics Software. The Sage Development Team (2019). http://www.sagemath.org
Salam, I., Ooi, T.H., Xue, L., Yau, W.-C., Pieprzyk, J., Phan, R.C.-W.: Random differential fault Attacks on the lightweight authenticated encryption stream cipher Grain-128AEAD. IEEE Access 9, 72568–72586 (2021). https://doi.org/10.1109/ACCESS.2021.3078845
Wu, H., Huang, T.: TinyJAMBU: a family of lightweight authenticated encryption algorithms. NIST Lightweight Cryptography (LWC) Project (2019). https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/TinyJAMBU-spec-round2.pdf
Acknowledgements
This work is supported by the Ministry of Higher Education Malaysia (MOHE) through the Fundamental Research Grant Scheme (FRGS), Project No. FRGS/1/2021/ICT07/XMU/02/1, as well as the Xiamen University Malaysia Research Fund under Grants XMUMRF/2019-C3/IECE/0005, XMUMRF/2019-C4/IECE/0011, and XMUMRF/2022-C9/IECE/0032. Josef Pieprzyk has been supported by the Australian Research Council Grant DP180102199 and the Polish National Science Center (NCN) Grant 2018/31/B/ST6/03003.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A Additional low degree equations
Additional low-degree equations obtained by injecting faults at \(s_{127}\) to \(s_{138}\) and \(s_{147}\) to \(s_{159}\). The equations are then simplified by substituting the known register values. Here \(\varDelta _{1, i}^{1, j}\) represents the XOR differential of the \(i{\text {th}}\) keystream bit when fault is injected at \(s_{j}\); \(7 \le i \le 31\) and \(j = 127, \ldots , 138, 147, \ldots , 159\). The variable \(c_{i}^{j}\) refers to a constant value corresponding to \(\varDelta _{1, i}^{1, j}\)
Appendix B Simplified linear equations
These equations are obtained by substituting the known register bits and equations obtained through fault injections in Eqs. (10) to (41). The variable \(c_{i}\) refers to a constant obtained by substituting known values in the \(i{\text {th}}\) keystream equation; \(0 \le i \le 31\).
Appendix C Signatures for fault targets
We list the signatures for identifying fault location under moderate precision model (See Tables 7, 8, 10, 11, 12, 13). Note that there are other fault targets that may be identified through this method; however, here we only list targets that are required for our attack.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Salam, I., Yau, WC., Phan, R.CW. et al. Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128. J Cryptogr Eng 13, 265–281 (2023). https://doi.org/10.1007/s13389-023-00326-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13389-023-00326-0