Abstract
SPECK is a new family of lightweight block ciphers proposed by the U.S. National Security Agency in 2013. So far, there exist several fault analysis results on this family. In this paper, we propose an improved fault analysis on SPECK under the random byte fault model, which only needs to induce faults at one intermediate round to retrieve the whole master key. In this attack, the fault propagation properties of SPECK are fully utilized, not only to determine the locations and the values of the faults, but also to eliminate incorrect candidates of the key. Moreover, compared with the previous approaches, more characteristics of the nonlinear modular addition operation are exploited, and the relations between different pairs of ciphertexts are also taken into account, which greatly enhance the efficiency of the key recovery. Finally, the experimental results confirm the correctness and the effectiveness of our proposed attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997). doi:10.1007/3-540-69053-0_4
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997). doi:10.1007/BFb0052259
Hemme, L.: A differential fault attack against early rounds of (triple-)DES. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 254–267. Springer, Heidelberg (2004). doi:10.1007/978-3-540-28632-5_19
Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45238-6_7
Chen, C.-N., Yen, S.-M.: Differential fault analysis on AES key schedule and some countermeasures. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 118–129. Springer, Heidelberg (2003). doi:10.1007/3-540-45067-X_11
Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on A.E.S. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 293–306. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45203-4_23
Chen, H., Wu, W., Feng, D.: Differential fault analysis on CLEFIA. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 284–295. Springer, Heidelberg (2007). doi:10.1007/978-3-540-77048-0_22
Biehl, I., Meyer, B., Müller, V.: Differential fault attacks on elliptic curve cryptosystems. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 131–146. Springer, Heidelberg (2000). doi:10.1007/3-540-44598-6_8
Biham, E., Granboulan, L., Nguyen, P.Q.: Impossible fault analysis of RC4 and differential fault analysis of RC4. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 359–367. Springer, Heidelberg (2005). doi:10.1007/11502760_24
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404 (2013). http://eprint.iacr.org
Abed, F., List, E., Lucks, S., Wenzel, J.: Differential cryptanalysis of round-reduced Simon and Speck. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 525–545. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46706-0_27
Biryukov, A., Roy, A., Velichkov, V.: Differential analysis of block ciphers SIMON and SPECK. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 546–570. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46706-0_28
Dinur, I.: Improved differential cryptanalysis of round-reduced speck. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 147–164. Springer, Heidelberg (2014). doi:10.1007/978-3-319-13051-4_9
Ashur, T., Bodden, D.: Linear cryptanalysis of reduced-round SPECK. http://securewww.esat.kuleuven.be/cosic/publications/article-2666.pdf
Liu, Y., Fu, K., Wang, W., Sun, L., Wang, M.: Linear cryptanalysis of reduced-round SPECK. Inf. Process. Lett. 116(3), 259–266 (2016)
Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Differential fault analysis on the families of SIMON and SPECK ciphers. In: Fault Diagnosis and Tolerance in Cryptography-FDTC 2014 Workshop on IEEE, pp. 40–48 (2014)
Huo, Y., Zhang, F., Feng, X., Wang, L.: Improved differential fault attack on the block cipher SPECK. In: Fault Diagnosis and Tolerance in Cryptography-FDTC 2015 Workshop on IEEE, pp. 28–34 (2015)
Feller, W.: An Introduction to Probability Theory and Its Applications, vol. 3, 3rd edn. Wiley, Hoboken (1968)
Acknowledgements
We would like to thank the anonymous reviewers for providing valuable comments. This work is supported by the National Basic Research Program of China (973 Program, No.2013CB338002).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Feng, J., Chen, H., Gao, S., Fan, L., Feng, D. (2017). Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round. In: Hong, S., Park, J. (eds) Information Security and Cryptology – ICISC 2016. ICISC 2016. Lecture Notes in Computer Science(), vol 10157. Springer, Cham. https://doi.org/10.1007/978-3-319-53177-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-53177-9_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53176-2
Online ISBN: 978-3-319-53177-9
eBook Packages: Computer ScienceComputer Science (R0)