Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth

نویسندگان

  • Xin-jie Zhao
  • Tao Wang
چکیده

In this paper, we present two further improved differential fault analysis methods on Camellia by exploring fault width and depth. Our first method broadens the fault width of previous Camellia attacks, injects multiple byte faults into the r round left register to recover multiple bytes of the r round equivalent key, and obtains Camellia-128,192/256 key with at least 8 and 12 faulty ciphertexts respectively; our second method extends fault depth of previous Camellia attacks, injects one byte fault into the r-2 round left register to recover full 8 bytes of the r round equivalent key, 5-6 bytes of the r-1 round equivalent key, 1 byte of the r-2 round equivalent key, and obtains Camellia-128,192/256 key with 4 and 6 faulty ciphertexts respectively. Simulation experiments demonstrate: due to its reversible permutation function, Camellia is vulnerable to multiple bytes fault attack, the attack efficiency is increased with fault width, this feature greatly improves fault attack’s practicalities; and due to its Feistel structure, Camellia is also vulnerable to deep single byte fault attack, 4 and 6 faulty ciphertexts are enough to reduce Camellia-128 and Camellia-192/256 key hypotheses to 2 and 2 respectively.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Differential Fault Attack on Camellia

The S-box lookup is one of the most important operations in cipher algorithm design, and also is the most effective part to prevent traditional linear and differential attacks, however, when the physical implementation of the algorithm is considered, it becomes the weakest part of cryptosystems. This paper studies an active fault based implementation attack on block ciphers with S-box. Firstly,...

متن کامل

Modeling of Fault Co-seismic Displacement Fields in Elastic Environments Based on Spherical Dislocation Theory

This research is based on the modeling of co-seismic deformations due to the fault movement in the elastic environments, and we can obtain the deformations generated in the faults. Here, modeling of the co-seismic displacement field is based on the analytical method with two spherical dislocation model and half-space dislocation model. The difference in displacement field from two spherical and...

متن کامل

Fault Detection of the Camellia Cipher against Single Byte Differential Fault Analysis

The Camellia is a 128-bit block cipher published by NTT and Mitsubishi in 2000. Since the research of differential fault analysis against Camellia was proposed, much work has been devoted to realizing a more efficient different fault analysis. It is a very strong analysis for ciphers when a single fault is injected into the last several rounds of encryption and the whole secret key could be rec...

متن کامل

SAR Interferometry, Bayesian inversion, Sarpol-e zahab earthquake, Fault source parameters

Abstract Earthquakes occur at teh border of teh plates and faults, causing financial and casual damages. Teh study of earthquakes and surface deformation is useful in understanding teh mechanism of earthquakes and managing teh risks and crises of earthquakes. A fault can be specified by its geometric source parameters. In Okada’s definition, these parameters are length, width, depth, strike, di...

متن کامل

Relaxed Differential Fault Analysis of SHA-3

In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2010  شماره 

صفحات  -

تاریخ انتشار 2010