Skip to main content

New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA

  • Conference paper
Advances in Information and Computer Security (IWSEC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8231))

Included in the following conference series:

Abstract

In this paper, we show a new property for the diffusion switching mechanismĀ (DSM) which was proposed by Shirai and Shibutani in 2006, and propose new differential fault attacksĀ (DFAs) on CLEFIA. The DSM is an effective mechanism to design Feistel ciphers, and Feistel ciphers using the DSM are more secure against the differential and the linear cryptanalysis. By applying the DSM to the generalized Feistel network, Shirai et al. proposed a 128-bit block cipher CLEFIA which was adopted as an ISO standard. Shirai and Shibutani proposed two types DSMs; one is using two matrices and the other is using three matrices. It was considered that the security difference between two types DSMs was quite small. In this paper, we propose a new property for the DSM. Our property can be applied to two types DSMs, in particular, it can be applied to the one using two matrices efficiently. We show a small security advantage of the DSM using three matrices, and our results contribute to the comprehension of the DSM. Moreover we can improve DFAs on CLEFIA by using our property. Existing DFAs can not execute without exploiting several faults induced after the 14-th round, but our new DFAs can execute by exploiting several faults induced after the 12-th round. The position where several faults are induced of new DFAs is improved, and it is two rounds earlier than that of existing works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The 128-Bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0. Sony Corporation (2007)

    Google ScholarĀ 

  2. Ali, S.S., Mukhopadhyay, D.: Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis. Cryptology ePrint Archive, Report 2012/286 (2012)

    Google ScholarĀ 

  3. Ali, S.S., Mukhopadhyay, D.: Improved Differential Fault Analysis of CLEFIA. In: FDTC (2013)

    Google ScholarĀ 

  4. Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. J. CryptologyĀ 4(1), 3ā€“72 (1991)

    ArticleĀ  MathSciNetĀ  MATHĀ  Google ScholarĀ 

  5. Chen, H., Wu, W., Feng, D.: Differential Fault Analysis on CLEFIA. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol.Ā 4861, pp. 284ā€“295. Springer, Heidelberg (2007)

    ChapterĀ  Google ScholarĀ 

  6. Derbez, P., Fouque, P.-A., Leresteux, D.: Meet-in-the-Middle and Impossible Differential Fault Analysis on AES. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.Ā 6917, pp. 274ā€“291. Springer, Heidelberg (2011)

    ChapterĀ  Google ScholarĀ 

  7. Kim, C.H.: Efficient Methods for Exploiting Faults Induced at AES Middle Rounds. Cryptology ePrint Archive, Report 2011/349 (2011)

    Google ScholarĀ 

  8. Li, Y., Wu, W., Zhang, L.: Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher. In: Jung, S., Yung, M. (eds.) WISA 2011. LNCS, vol.Ā 7115, pp. 28ā€“39. Springer, Heidelberg (2012)

    ChapterĀ  Google ScholarĀ 

  9. Mala, H., Dakhilalian, M., Shakiba, M.: Impossible Differential Attacks on 13-Round CLEFIA-128. J. Comput. Sci. Technol.Ā 26(4), 744ā€“750 (2011)

    ArticleĀ  MathSciNetĀ  Google ScholarĀ 

  10. Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.Ā 765, pp. 386ā€“397. Springer, Heidelberg (1994)

    ChapterĀ  Google ScholarĀ 

  11. Matsui, M., Yamagishi, A.: A New Method for Known Plaintext Attack of FEAL Cipher. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.Ā 658, pp. 81ā€“91. Springer, Heidelberg (1993)

    ChapterĀ  Google ScholarĀ 

  12. Phan, R.C.-W., Yen, S.-M.: Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol.Ā 3928, pp. 135ā€“150. Springer, Heidelberg (2006)

    ChapterĀ  Google ScholarĀ 

  13. Sasaki, Y., Li, Y., Sakamoto, H., Sakiyama, K.: Coupon Collectorā€™s Problem for Fault Analysis Against AES ā€” High Tolerance for Noisy Fault Injections. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol.Ā 7859, pp. 213ā€“220. Springer, Heidelberg (2013)

    ChapterĀ  Google ScholarĀ 

  14. Shirai, T., Preneel, B.: On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.Ā 3329, pp. 1ā€“15. Springer, Heidelberg (2004)

    ChapterĀ  Google ScholarĀ 

  15. Shirai, T., Shibutani, K.: Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.Ā 3017, pp. 260ā€“278. Springer, Heidelberg (2004)

    ChapterĀ  Google ScholarĀ 

  16. Shirai, T., Shibutani, K.: On Feistel Structures Using a Diffusion Switching Mechanism. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.Ā 4047, pp. 41ā€“56. Springer, Heidelberg (2006)

    ChapterĀ  Google ScholarĀ 

  17. Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-Bit Blockcipher CLEFIA (Extended Abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.Ā 4593, pp. 181ā€“195. Springer, Heidelberg (2007)

    ChapterĀ  Google ScholarĀ 

  18. Takahashi, J., Fukunaga, T.: Improved Differential Fault Analysis on CLEFIA. In: FDTC, pp. 25ā€“34. IEEE Computer Society (2008)

    Google ScholarĀ 

  19. Takahashi, J., Fukunaga, T.: Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys. IEICE TransactionsĀ 93-A(1), 136ā€“143 (2010)

    ArticleĀ  Google ScholarĀ 

  20. Tezcan, C.: The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol.Ā 6498, pp. 197ā€“209. Springer, Heidelberg (2010)

    ChapterĀ  Google ScholarĀ 

  21. Jie Zhao, X., Wang, T., Zhe Gao, J.: Multiple Bytes Differential Fault Analysis on CLEFIA. Cryptology ePrint Archive, Report 2010/078 (2010)

    Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Todo, Y., Sasaki, Y. (2013). New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA. In: Sakiyama, K., Terada, M. (eds) Advances in Information and Computer Security. IWSEC 2013. Lecture Notes in Computer Science, vol 8231. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41383-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41383-4_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41382-7

  • Online ISBN: 978-3-642-41383-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics