Inapplicability of Differential Fault Attacks Against Cellular Automata Based Lightweight Authenticated Cipher

被引:0
|
作者
Ambili, K. N. [1 ]
Jose, J. I. M. M. Y. [1 ]
机构
[1] Natl Inst Technol Calicut, Dept Comp Sci & Engn, Kozhikode, India
关键词
ACORN; TinyJambu; differential fault attack; optimized interpola-tion attack; cellular automata; PCA; 90-150; authenticated encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authenticated encryption (AE) schemes are a necessity to secure the physical devices connected to the Internet. Two AE schemes, Tiny-Jambu and Elephant, are finalists of NIST lightweight cryptography competition. Another AE scheme, ACORN v3, a CAESAR compe-tition finalist, has been shown to be particularly vulnerable against Differential Fault Attack (DFA), even more than its previous version ACORN v2. TinyJambu is also susceptible to DFA. An optimized inter-polation attack has been proposed against one instance of Elephant, Delirium, recently. We propose methods to strengthen these schemes using the Cellular Automata (CA) and increase their resistance to these attacks. The Programmable Cellular Automata (PCA) 90-150 is effec-tively deployed to make these ciphers robust against DFA. We also pro-vide mathematical analysis of the invigorated schemes and show that significant improvement is achieved in all the three enhanced schemes.
引用
收藏
页码:337 / 362
页数:26
相关论文
共 47 条
  • [31] A Cellular Automata Based Scheme for Energy Efficient Fault Diagnosis in WSN
    Khan, Nasiruddin
    Maity, Ilora
    Das, Sukanta
    Sikdar, Biplab K.
    CELLULAR AUTOMATA, ACRI 2012, 2012, 7495 : 234 - 243
  • [32] A Symmetric Key Multiple Color Image Cipher Based on Cellular Automata, Chaos Theory and Image Mixing
    SundaraKrishnan, K.
    Jaison, B.
    Raja, S. P.
    INFORMATION TECHNOLOGY AND CONTROL, 2021, 50 (01): : 55 - 75
  • [33] SPF-CA-1.2: an enhanced version of cellular automata-based block cipher system
    Achkoun, K.
    Hanin, C.
    Sadak, A.
    Ziani, F.
    Omary, F.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (03) : 194 - 208
  • [34] L-CAHASH: A Novel Lightweight Hash Function Based on Cellular Automata for RFID
    Hanin, Charifa
    Echandouri, Bouchra
    Omary, Fouzia
    El Bernoussi, Souad
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 287 - 298
  • [35] Assessing cellular automata based models using partial differential equations
    Doeschl, A
    Davison, M
    Rasmussen, H
    Reid, G
    MATHEMATICAL AND COMPUTER MODELLING, 2004, 40 (9-10) : 977 - 994
  • [36] A Differential Evolution-based Rule Ordering of Cellular Automata for Classification
    Wanna, Pattapon
    Wongthanavasu, Sartra
    Ponkaew, Jetsada
    2018 10TH INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SMART TECHNOLOGY (KST 2018) - CYBERNETICS IN THE NEXT DECADES, 2018, : 34 - 39
  • [37] Research on Fault-relating Pattern of Mechanical System Based on Cellular Automata
    Yan, Gao
    Xiang, Zhao
    FOURTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2011): MACHINE VISION, IMAGE PROCESSING, AND PATTERN ANALYSIS, 2012, 8349
  • [38] A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher
    Lira, Everton R.
    de Macedo, Heverton B.
    Lima, Danielli A.
    Alt, Leonardo
    Oliveira, Gina M. B.
    NATURAL COMPUTING, 2023,
  • [39] A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm
    Liu, Shuai
    Ren, Jizhou
    Guan, Jie
    Hu, Bin
    Ma, Sudong
    Bai, Hao
    COMPUTER JOURNAL, 2024, 67 (04) : 1370 - 1380
  • [40] Cellular automata-based CMF detection under single and multiple post-processing attacks
    Gulnawaz Gani
    Zubair Jeelani
    Fasel Qadir
    Multimedia Systems, 2022, 28 : 257 - 266