Differential Fault Attack on Rocca

被引:2
作者
Anand, Ravi [1 ]
Isobe, Takanori [1 ,2 ,3 ]
机构
[1] Univ Hyogo, Kobe, Hyogo, Japan
[2] Natl Inst Informat & Commun Technol NICT, Tokyo, Japan
[3] Japan Sci & Technol Agcy, PRESTO, Tokyo, Japan
来源
INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021 | 2022年 / 13218卷
关键词
Fault attack; Differential fault attack; Random faults; Rocca; Side channel attack; AES SBox;
D O I
10.1007/978-3-031-08896-4_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rocca is the first dedicated cipher for 6G systems accepted in ToSC 2021 and will be presented at FSE 2022. In this paper we show that Rocca is susceptible to differential fault attack under the nonce reuse scenario. The attack outcome results in a complete internal state recovery by injecting 4 x 48 faults in three out of eight internal state registers. Since the round update function of Rocca is reversible it also allows for key recovery. To the best of our knowledge this is the first third party analysis of Rocca.
引用
收藏
页码:283 / 295
页数:13
相关论文
共 16 条
  • [1] Random Fault Attacks on a Class of Stream Ciphers
    Bartlett, Harry
    Dawson, Ed
    Al Mahri, Hassan Qahur
    Salam, Md. Iftekhar
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [2] Berti Francesco., 2019, IACR Transactions on Cryptographic Hardware and Embedded Systems, P256, DOI DOI 10.46586/TCHES.V2020.I1.256-320
  • [3] Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
  • [4] Blömer J, 2003, LECT NOTES COMPUT SC, V2742, P162
  • [5] Boneh D., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P37
  • [6] Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers
    Dey, Prakash
    Rohit, Raghvendra Singh
    Sarkar, Santanu
    Adhikari, Avishek
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 74 - 86
  • [7] Dusart P, 2003, LECT NOTES COMPUT SC, V2846, P293
  • [8] Efficient Design Strategies Based on the AES Round Function
    Jean, Jeremy
    Nikolic, Ivica
    [J]. FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 334 - 353
  • [9] SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
    Khairallah, Mustafa
    Hou, Xiaolu
    Najm, Zakaria
    Breier, Jakub
    Bhasin, Shivam
    Peyrin, Thomas
    [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 403 - 414
  • [10] Khairallah M, 2019, 2019 IEEE 8TH INTERNATIONAL WORKSHOP ON ADVANCES IN SENSORS AND INTERFACES (IWASI), P189, DOI 10.1109/IWASI.2019.8791393