DEFAULT: Cipher Level Resistance Against Differential Fault Attack

نویسندگان

چکیده

Differential Fault Analysis (DFA) is a well known cryptanalytic technique that exploits faulty outputs of an encryption device. Despite its popularity and similarity with the classical (DA), thorough analysis explaining DFA from designer’s point-of-view missing in literature. To best our knowledge, no immune block cipher at algorithmic level has been proposed so far. Furthermore, all countermeasures somehow depend on device/protocol or implementation such as duplication/comparison. As these are outside scope designer, we focus designing primitive which can protect own. We present first concept resistance does not rely any related assumption, nor it form duplication. Our construction simple, software/hardware friendly security scales up state size. It be plugged before and/or after (almost) symmetric key will ensure non-trivial search complexity against DFA. One component protection layer SBox linear structures. Such SBoxes have never used design they generally perform poorly differential attacks. argue fact represent interesting trade-off between good cryptographic properties resistance. proof concept, construct protecting layer, named DEFAULT-LAYER, full-fledged DEFAULT. solutions compare favorably to state-of-the-art, offering advantages over sophisticated duplication based like impeccable circuits/CRAFT infective countermeasures.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evolution Cipher against Differential Power Attack

Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized to construct different countermeasures against DPAs, such as balancing technologies. We propose a novel methodology to implement a secure DPA resistant crypto processor and we name this as evolutionary cipher(EVOC). EVO...

متن کامل

Differential Fault Attack on the PRINCE Block Cipher

PRINCE is a new lightweight block cipher proposed at the ASIACRYPT’2012 conference. In this paper two observations on the linear layer of the cipher are presented. Based on the observations a differential fault attack is applied to the cipher under a random nibblelevel fault model. The attack uniquely determines the 128-bit key of the cipher using less than 7 fault injections averagely. In the ...

متن کامل

A Differential Fault Attack Against Early Rounds of (Triple-)DES

Previously proposed differential fault analysis (DFA) techniques against iterated block ciphers mostly exploit computational errors in the last few rounds of the cipher to extract the secret key. In this paper we describe a DFA attack that exploits computational errors in early rounds of a Feistel cipher. The principle of the attack is to force collisions by inducing faults in intermediate resu...

متن کامل

A Generalized Method of Differential Fault Attack Against AES Cryptosystem

Abstract. In this paper we describe two differential fault attack techniques against Advanced Encryption Standard (AES). We propose two models for fault occurrence; we could find all 128 bits of key using one of them and only 6 faulty ciphertexts. We need approximately 1500 faulty ciphertexts to discover the key with the other fault model. Union of these models covers all faults that can occur ...

متن کامل

Fault Detection of the Camellia Cipher against Single Byte Differential Fault Analysis

The Camellia is a 128-bit block cipher published by NTT and Mitsubishi in 2000. Since the research of differential fault analysis against Camellia was proposed, much work has been devoted to realizing a more efficient different fault analysis. It is a very strong analysis for ciphers when a single fault is injected into the last several rounds of encryption and the whole secret key could be rec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-92075-3_5