Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Differential Fault Attack on ITUbee Block Cipher

Published: 19 December 2016 Publication History

Abstract

Differential Fault Attack (DFA) is a powerful cryptanalytic technique to retrieve secret keys by exploiting the faulty ciphertexts generated during encryption procedure. This article proposes a novel DFA attack that is effective on ITUbee, a software-oriented block cipher for resource-constrained devices. Different from other DFA, our attack makes use of not only faulty values, but also differences between fault-free intermediate values corresponding to 2 plaintexts, which combine traditional differential analysis with DFA. The possible injection positions with different number of faults are discussed. The most efficient attack takes 225 round function operations with 4 faults, which is achieved in a few seconds on a PC.

References

[1]
Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, and J.-P. Seifert. 2003. Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In Cryptographic Hardware and Embedded Systems (CHES’02). Springer, 260--275.
[2]
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, and Claire Whelan. 2006. The sorcerer’s apprentice guide to fault attacks. Proceedings of IEEE 94, 2, 370--382.
[3]
Alessandro Barenghi, Guido M. Bertoni, Luca Breveglieri, Mauro Pellicioli, and Gerardo Pelosi. 2010. Low voltage fault attacks to AES. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’10). IEEE, 7--12.
[4]
Eli Biham and Adi Shamir. 1997. Differential fault analysis of secret key cryptosystems. In Advances in Cryptology (CRYPTO’97). Springer, 513--525.
[5]
Chien-Ning Chen and Sung-Ming Yen. 2003. Differential fault analysis on AES key schedule and some countermeasures. In Information Security and Privacy. Springer, 118--129.
[6]
Hua Chen, Wenling Wu, and Dengguo Feng. 2007. Differential fault analysis on CLEFIA. In Information and Communications Security. Springer, 284--295.
[7]
Joan Daemen and Vincent Rijmen. 2002. The Design of Rijndael:—the Advanced Encryption Standard. Springer.
[8]
Pierre Dusart, Gilles Letourneux, and Olivier Vivolo. 2003. Differential fault analysis on AES. In Applied Cryptography and Network Security. Springer, 293--306.
[9]
Toshinori Fukunaga and Junko Takahashi. 2009. Practical fault attack on a cryptographic LSI with ISO/IEC 18033-3 block ciphers. In Fault Diagnosis and Tolerance in Cryptography (FDTC’09). IEEE, 84--92.
[10]
Henri Gilbert and Thomas Peyrin. 2010. Super-Sbox cryptanalysis: Improved attacks for AES-like permutations. In Fast Software Encryption. Springer, 365--383.
[11]
Ferhat Karakoç, Hüseyin Demirci, and A. Emre Harmanci. 2013. ITUbee: A software oriented lightweight block cipher. In Lightweight Cryptography for Security and Privacy. Springer, 16--27.
[12]
Chong Hee Kim. 2012. Differential fault analysis of AES: Toward reducing number of faults. Information Sciences 199, 43--57.
[13]
Chong Hee Kim and Jean-Jacques Quisquater. 2008. New differential fault analysis on AES key schedule: Two faults are enough. In Smart Card Research and Advanced Applications. Springer, 48--60.
[14]
Ruilin Li, Bing Sun, Chao Li, and Jianxiong You. 2011. Differential fault analysis on SMS4 using a single fault. Information Processing Letters 111, 4, 156--163.
[15]
Wei Li, Dawu Gu, and Juanru Li. 2008. Differential fault analysis on the ARIA algorithm. Information Sciences 178, 19, 3727--3737.
[16]
Amir Moradi, Mohammad T. Manzuri Shalmani, and Mahmoud Salmasizadeh. 2006. A generalized method of differential fault attack against AES cryptosystem. In Cryptographic Hardware and Embedded Systems (CHES’06). Springer, 91--100.
[17]
Gilles Piret and Jean-Jacques Quisquater. 2003. A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In Cryptographic Hardware and Embedded Systems (CHES’03). Springer, 77--88.
[18]
Hadi Soleimany. 2015. Self-similarity cryptanalysis of the block cipher ITUbee. Information Security, IET 9, 3, 179--184.
[19]
Junko Takahashi and Toshinori Fukunaga. 2008. Improved differential fault analysis on CLEFIA. In 5th Workshop on Fault Diagnosis and Tolerance in Cryptography. (FDTC’08). IEEE, 25--34.

Cited By

View all
  • (2023)Meet-in-the-Middle Differential Fault Analysis on ITUbee Block CipherSymmetry10.3390/sym1506119615:6(1196)Online publication date: 2-Jun-2023
  • (2022)The differential fault analysis on block cipher FeWCybersecurity10.1186/s42400-022-00130-z5:1Online publication date: 3-Nov-2022
  • (2018)RFID: Robust Fault Injection Detection Method for the Advanced Encryption Standard Using Time and Information RedundancyJournal of Circuits, Systems and Computers10.1142/S0218126619500415Online publication date: 18-May-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Embedded Computing Systems
ACM Transactions on Embedded Computing Systems  Volume 16, Issue 2
Special Issue on LCETES 2015, Special Issue on ACSD 2015 and Special Issue on Embedded Devise Forensics and Security
May 2017
705 pages
ISSN:1539-9087
EISSN:1558-3465
DOI:10.1145/3025020
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 19 December 2016
Accepted: 01 June 2016
Revised: 01 March 2016
Received: 01 November 2015
Published in TECS Volume 16, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Differential fault attack
  2. ITUbee

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Meet-in-the-Middle Differential Fault Analysis on ITUbee Block CipherSymmetry10.3390/sym1506119615:6(1196)Online publication date: 2-Jun-2023
  • (2022)The differential fault analysis on block cipher FeWCybersecurity10.1186/s42400-022-00130-z5:1Online publication date: 3-Nov-2022
  • (2018)RFID: Robust Fault Injection Detection Method for the Advanced Encryption Standard Using Time and Information RedundancyJournal of Circuits, Systems and Computers10.1142/S0218126619500415Online publication date: 18-May-2018
  • (2016)Embedded Device Forensics and SecurityACM Transactions on Embedded Computing Systems10.1145/301566216:2(1-5)Online publication date: 12-Dec-2016

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media