Differential fault analysis on block cipher SEED

https://doi.org/10.1016/j.mcm.2011.01.008Get rights and content
Under an Elsevier user license
open archive

Abstract

SEED is a Korean standard block cipher, and it is chosen as a 128-bit ISO/IEC standard block cipher together with AES and Camellia. In this paper, we propose a differential fault analysis on SEED on the basis of the bit-oriented model. Our fault model on SEED-128 is more flexible than the previous fault model on SEED-128. And our attack results on SEED-192/256 are the first known cryptanalytic results. From the simulation results, our attack on SEED-128 can recover a 128-bit secret key within a few seconds by inducing four faults. However, the computational complexities of our attack on SEED-192/256 are impractical.

Keywords

Differential fault analysis
Block cipher
SEED

Cited by (0)

This work was supported by a National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST) (No. 2010-0000261).