Skip to main content

Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round

  • Conference paper
  • First Online:
Information Security and Cryptology – ICISC 2016 (ICISC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10157))

Included in the following conference series:

Abstract

SPECK is a new family of lightweight block ciphers proposed by the U.S. National Security Agency in 2013. So far, there exist several fault analysis results on this family. In this paper, we propose an improved fault analysis on SPECK under the random byte fault model, which only needs to induce faults at one intermediate round to retrieve the whole master key. In this attack, the fault propagation properties of SPECK are fully utilized, not only to determine the locations and the values of the faults, but also to eliminate incorrect candidates of the key. Moreover, compared with the previous approaches, more characteristics of the nonlinear modular addition operation are exploited, and the relations between different pairs of ciphertexts are also taken into account, which greatly enhance the efficiency of the key recovery. Finally, the experimental results confirm the correctness and the effectiveness of our proposed attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997). doi:10.1007/3-540-69053-0_4

    Chapter  Google Scholar 

  2. Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997). doi:10.1007/BFb0052259

    Chapter  Google Scholar 

  3. Hemme, L.: A differential fault attack against early rounds of (triple-)DES. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 254–267. Springer, Heidelberg (2004). doi:10.1007/978-3-540-28632-5_19

    Chapter  Google Scholar 

  4. Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45238-6_7

    Chapter  Google Scholar 

  5. Chen, C.-N., Yen, S.-M.: Differential fault analysis on AES key schedule and some countermeasures. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 118–129. Springer, Heidelberg (2003). doi:10.1007/3-540-45067-X_11

    Chapter  Google Scholar 

  6. Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on A.E.S. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 293–306. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45203-4_23

    Chapter  Google Scholar 

  7. Chen, H., Wu, W., Feng, D.: Differential fault analysis on CLEFIA. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 284–295. Springer, Heidelberg (2007). doi:10.1007/978-3-540-77048-0_22

    Chapter  Google Scholar 

  8. Biehl, I., Meyer, B., Müller, V.: Differential fault attacks on elliptic curve cryptosystems. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 131–146. Springer, Heidelberg (2000). doi:10.1007/3-540-44598-6_8

    Chapter  Google Scholar 

  9. Biham, E., Granboulan, L., Nguyen, P.Q.: Impossible fault analysis of RC4 and differential fault analysis of RC4. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 359–367. Springer, Heidelberg (2005). doi:10.1007/11502760_24

    Chapter  Google Scholar 

  10. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404 (2013). http://eprint.iacr.org

  11. Abed, F., List, E., Lucks, S., Wenzel, J.: Differential cryptanalysis of round-reduced Simon and Speck. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 525–545. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46706-0_27

    Google Scholar 

  12. Biryukov, A., Roy, A., Velichkov, V.: Differential analysis of block ciphers SIMON and SPECK. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 546–570. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46706-0_28

    Google Scholar 

  13. Dinur, I.: Improved differential cryptanalysis of round-reduced speck. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 147–164. Springer, Heidelberg (2014). doi:10.1007/978-3-319-13051-4_9

    Chapter  Google Scholar 

  14. Ashur, T., Bodden, D.: Linear cryptanalysis of reduced-round SPECK. http://securewww.esat.kuleuven.be/cosic/publications/article-2666.pdf

  15. Liu, Y., Fu, K., Wang, W., Sun, L., Wang, M.: Linear cryptanalysis of reduced-round SPECK. Inf. Process. Lett. 116(3), 259–266 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  16. Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Differential fault analysis on the families of SIMON and SPECK ciphers. In: Fault Diagnosis and Tolerance in Cryptography-FDTC 2014 Workshop on IEEE, pp. 40–48 (2014)

    Google Scholar 

  17. Huo, Y., Zhang, F., Feng, X., Wang, L.: Improved differential fault attack on the block cipher SPECK. In: Fault Diagnosis and Tolerance in Cryptography-FDTC 2015 Workshop on IEEE, pp. 28–34 (2015)

    Google Scholar 

  18. Feller, W.: An Introduction to Probability Theory and Its Applications, vol. 3, 3rd edn. Wiley, Hoboken (1968)

    MATH  Google Scholar 

Download references

Acknowledgements

We would like to thank the anonymous reviewers for providing valuable comments. This work is supported by the National Basic Research Program of China (973 Program, No.2013CB338002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hua Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Feng, J., Chen, H., Gao, S., Fan, L., Feng, D. (2017). Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round. In: Hong, S., Park, J. (eds) Information Security and Cryptology – ICISC 2016. ICISC 2016. Lecture Notes in Computer Science(), vol 10157. Springer, Cham. https://doi.org/10.1007/978-3-319-53177-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53177-9_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53176-2

  • Online ISBN: 978-3-319-53177-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics