A Differential Fault Analysis Attack Against the Light Weight PRINTcipher

被引:0
|
作者
Zhang Wenying [1 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptanalysis; Fault attack; IC-Printing block cipher (PRINTcipher); Block cipher; CRYPTANALYSIS; CIPHER;
D O I
10.1049/cje.2016.10.002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We present two fault injection attacks against the IC-Printing block cipher (PRINTcipher). The basic idea of our attack is to notice the property that by using some couples of input difference and output difference, the attacker can determine the permutation control key. To recover the permutation control key, one needs to inject at least 4 faults. It is needed at least 15 faults to reveal the whole key.
引用
收藏
页码:1019 / 1024
页数:6
相关论文
共 50 条
  • [21] Differential Fault Attack on Rocca
    Anand, Ravi
    Isobe, Takanori
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 283 - 295
  • [22] Differential fault attack on Camellia
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
    Chin J Electron, 2009, 1 (13-19):
  • [23] Evolutionary ciphers against differential power analysis and differential fault analysis
    Tang Ming
    Qiu ZhenLong
    Yang Min
    Cheng PingPan
    Gao Si
    Liu ShuBo
    Meng QinShu
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (11) : 2555 - 2569
  • [24] Evolutionary ciphers against differential power analysis and differential fault analysis
    Ming Tang
    ZhenLong Qiu
    Min Yang
    PingPan Cheng
    Si Gao
    ShuBo Liu
    QinShu Meng
    Science China Information Sciences, 2012, 55 : 2555 - 2569
  • [25] Evolutionary ciphers against differential power analysis and differential fault analysis
    TANG Ming1
    2School of Computers
    3International School of Software
    Science China(Information Sciences), 2012, 55 (11) : 2555 - 2569
  • [26] Vulnerability Analysis Against Fault Attack in terms of the Timing Behavior of Fault Injection
    Fakhire, Mahboube
    Jahanian, Ali
    2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, : 374 - 379
  • [27] Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures
    Stanislav Bulygin
    Michael Walter
    Johannes Buchmann
    Designs, Codes and Cryptography, 2014, 73 : 997 - 1022
  • [28] Full analysis of PRINTCIPHER with respect to invariant subspace attack: efficient key recovery and countermeasures
    Bulygin, Stanislav
    Walter, Michael
    Buchmann, Johannes
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (03) : 997 - 1022
  • [29] A differential fault attack technique against SPN structures, with application to the AES and KHAZAD
    Piret, G
    Quisquater, JJ
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 77 - 88
  • [30] A Novel Encryption Scheme in Ship Remote Control against Differential Fault Attack
    Zeng, Hong
    Wang, Tianjian
    Zhang, Jundong
    Li, Dehao
    Shang, Di
    APPLIED SCIENCES-BASEL, 2022, 12 (16):