Abstract
In this paper, we focus on differential fault attack on lightweight block ciphers with GFN (Generalized Feistel Networks) structure. With regard to fault injection model and differential equations solving, two improved DFA (Differential Fault Analysis) methods are proposed. Based on this, we present the improved attack process which aims at applying lightweight block ciphers with GFN structure. We conduct 10000 DFA experiments on TWINE and LBlock. Result shows that it only takes 9.18 and 8.42 faults on average to recover the main key K respectively. Moreover, time and space complexity are both negligible.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 327–344. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21554-4_19
Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 342–357. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23951-9_23
Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326–341. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23951-9_22
Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74735-2_31
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997). https://doi.org/10.1007/3-540-69053-0_4
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052259
Zhang, L., Wu, W.: Differential fault analysis on SMS4. Chin. J. Comput. 29(9), 1596–1602 (2006)
Liu, P., Wang, X., Chaudhry, S.R., Javeed, K., Ma, Y., Collier, M.: Secure video streaming with lightweight cipher PRESENT in an SDN testbed. CMC: Comput. Mater. Continua 57(3), 353–363 (2018)
Paar, C., Eisenbarth, T., Kasper, M., Kasper, T., Moradi, A.: KeeLoq and side-channel analysis-evolution of an attack. In: Fault Diagnosis and Tolerance in Cryptography, pp. 65–69. IEEE (2009)
Li, W., Gu, D., Li, J., Liu, Z., Liu, Y.: Differential fault analysis on Camellia. J. Syst. Softw. 83(5), 844–851 (2010)
Zhang, S., Yang, X., Zhong, W., Sun, Y.: A highly effective DPA attack method based on genetic algorithm. CMC: Comput. Mater. Continua 56(2), 325–338 (2018)
FIPS PUB: Data Encryption Standard (DES). FIPS PUB 46-3 (1999)
Le Bouder, H., Thomas, G., Linge, Y., Tria, A.: On fault injections in generalized Feistel networks. In: Fault Diagnosis and Tolerance in Cryptography, pp. 83–93. IEEE (2014)
Zheng, Y., Matsumoto, T., Imai, H.: On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 461–480. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_42
Schneier, B., Kelsey, J.: Unbalanced Feistel networks and block cipher design. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 121–144. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-60865-6_49
Carlet, C.: Vectorial Boolean functions for cryptography. Boolean Models Methods Math. Comput. Sci. Eng. 134, 398–469 (2010)
Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 356–365. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053450
Xu, P., Wei, Y., Pan, X.: Differential fault attack on TWINE. Appl. Res. Comput. 32(6), 1796–1800 (2015)
Jia, P., Xu, H., Qi, W.: Research on cryptographic properties of lightweight S-boxes. J. Cryptol. Res. 2(6), 497–504 (2015)
Gao, Y., Wang, Y., Wang, L., Wang, T.: Improvement differential fault attack on TWINE. J. Commun. 38(Z2), 178–184 (2017)
Gao, Y., Wang, Y., Yuan, Q., Wang, T., Wang, X., Guo, L.: Methods of differential fault attack on LBlock with analysis of probability. In: Advanced Information Technology, Electronic and Automation Control Conference. IEEE (2018)
Li, W., Zhang, W., Gu, D.: Security analysis of the lightweight cryptosystem TWINE in the Internet of Things. KSII Trans. Internet Inf. Syst. 9(2), 793–810 (2015)
Jeong, K., Lee, C., Lim, J.: Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks. EURASIP J. Wirel. Commun. Network. 2013(1), 151 (2013)
Gao, S., Chen, H., Fan, L., Wu, W.: Improved fault attack on LBlock: earlier injection with no extra faults. Chin. J. Electron. 26(4), 754–759 (2017)
Wei, Y., Rong, Y., Wang, X.: New differential fault attack on lightweight cipher LBlock. In: International Conference on Intelligent Networking and Collaborative Systems, pp. 285–288. IEEE (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Gao, Y., Wang, Y., Yuan, Q., Wang, T., Wang, X. (2019). Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11633. Springer, Cham. https://doi.org/10.1007/978-3-030-24265-7_47
Download citation
DOI: https://doi.org/10.1007/978-3-030-24265-7_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24264-0
Online ISBN: 978-3-030-24265-7
eBook Packages: Computer ScienceComputer Science (R0)