Differential fault analysis on CLEFIA

被引:0
作者
Chen, Hua [1 ]
Wu, Wenling [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China
来源
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS | 2007年 / 4681卷
关键词
block cipher; generalized Feistel structure; differential fault attack; ATTACK; AES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
CLEFIA is a new 128-bit block cipher proposed by SONY corporation recently. The fundamental structure of CLEFIA is a generalized Feistel structure consisting of 4 data lines. In this paper, the strength of CLEFIA against the differential fault attack is explored. Our attack adopts the byte-oriented model of random faults. Through inducing randomly one byte fault in one round, four bytes of faults can be simultaneously obtained in the next round, which can efficiently reduce the total induce times in the attack. After attacking the last several rounds' encryptions, the original secret key can be recovered based on some analysis of the key schedule. The data complexity analysis and experiments show that only about 18 faulty ciphertexts are needed to recover the entire 128-bit secret key and about 54 faulty ciphertexts for 192/256-bit keys.
引用
收藏
页码:284 / 295
页数:12
相关论文
共 13 条
  • [1] Biehl I, 2000, LECT NOTES COMPUT SC, V1880, P131
  • [2] Biham E, 2005, LECT NOTES COMPUT SC, V3557, P359
  • [3] Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
  • [4] Blömer J, 2003, LECT NOTES COMPUT SC, V2742, P162
  • [5] Chen CN, 2003, LECT NOTES COMPUT SC, V2727, P118
  • [6] Dusart P, 2003, LECT NOTES COMPUT SC, V2846, P293
  • [7] Giraud C, 2005, LECT NOTES COMPUT SC, V3373, P27
  • [8] Hemme L, 2004, LECT NOTES COMPUT SC, V3156, P254
  • [9] Hoch JJ, 2004, LECT NOTES COMPUT SC, V3156, P240
  • [10] Lipton, 1997, LECT NOTES COMPUTER, V1233, P37, DOI DOI 10.1007/3-540-69053-0_