DEFAULT: Cipher Level Resistance Against Differential Fault Attack
نویسندگان
چکیده
Differential Fault Analysis (DFA) is a well known cryptanalytic technique that exploits faulty outputs of an encryption device. Despite its popularity and similarity with the classical (DA), thorough analysis explaining DFA from designer’s point-of-view missing in literature. To best our knowledge, no immune block cipher at algorithmic level has been proposed so far. Furthermore, all countermeasures somehow depend on device/protocol or implementation such as duplication/comparison. As these are outside scope designer, we focus designing primitive which can protect own. We present first concept resistance does not rely any related assumption, nor it form duplication. Our construction simple, software/hardware friendly security scales up state size. It be plugged before and/or after (almost) symmetric key will ensure non-trivial search complexity against DFA. One component protection layer SBox linear structures. Such SBoxes have never used design they generally perform poorly differential attacks. argue fact represent interesting trade-off between good cryptographic properties resistance. proof concept, construct protecting layer, named DEFAULT-LAYER, full-fledged DEFAULT. solutions compare favorably to state-of-the-art, offering advantages over sophisticated duplication based like impeccable circuits/CRAFT infective countermeasures.
منابع مشابه
Evolution Cipher against Differential Power Attack
Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized to construct different countermeasures against DPAs, such as balancing technologies. We propose a novel methodology to implement a secure DPA resistant crypto processor and we name this as evolutionary cipher(EVOC). EVO...
متن کاملDifferential Fault Attack on the PRINCE Block Cipher
PRINCE is a new lightweight block cipher proposed at the ASIACRYPT’2012 conference. In this paper two observations on the linear layer of the cipher are presented. Based on the observations a differential fault attack is applied to the cipher under a random nibblelevel fault model. The attack uniquely determines the 128-bit key of the cipher using less than 7 fault injections averagely. In the ...
متن کاملA Differential Fault Attack Against Early Rounds of (Triple-)DES
Previously proposed differential fault analysis (DFA) techniques against iterated block ciphers mostly exploit computational errors in the last few rounds of the cipher to extract the secret key. In this paper we describe a DFA attack that exploits computational errors in early rounds of a Feistel cipher. The principle of the attack is to force collisions by inducing faults in intermediate resu...
متن کاملA Generalized Method of Differential Fault Attack Against AES Cryptosystem
Abstract. In this paper we describe two differential fault attack techniques against Advanced Encryption Standard (AES). We propose two models for fault occurrence; we could find all 128 bits of key using one of them and only 6 faulty ciphertexts. We need approximately 1500 faulty ciphertexts to discover the key with the other fault model. Union of these models covers all faults that can occur ...
متن کاملFault Detection of the Camellia Cipher against Single Byte Differential Fault Analysis
The Camellia is a 128-bit block cipher published by NTT and Mitsubishi in 2000. Since the research of differential fault analysis against Camellia was proposed, much work has been devoted to realizing a more efficient different fault analysis. It is a very strong analysis for ciphers when a single fault is injected into the last several rounds of encryption and the whole secret key could be rec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-92075-3_5