A New SPN Type Architecture to Strengthen Block Cipher Against Fault Attack

نویسندگان

  • Gitika Maity
  • Jaydeb Bhaumik
  • Anjan Kundu
چکیده

In recent years, Differential Fault Analysis (DFA) has been proven as the most efficient technique to attack any block cipher by introducing a computational error. In this paper, a new Substitution Permutation Network (SPN) type architecture is proposed which has better resistance against DFA as compared to Advanced Encryption Standard (AES). The proposed architecture is similar to AES except round key mixing function. Here, round key is mixed with round output, using nonlinear vectorial Boolean function called ‘Nmix’. Using 4 faulty-fault free ciphertext pairs, 32 bits of 10 round key is retrieved by injecting a random byte fault at the input of 9 round. The computational complexity will be in the order of 2 to obtain 128 bits 10 round key. Total 16 numbers of faulty and fault free ciphertext pairs are required. Similarly, when a fault is injected at the input of 8 round, then the 10 round key is obtained with computational complexity of 2 and 20 numbers of faulty-fault free ciphertext pairs are required.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Differential Fault Attack on SPN Structure, with Application to AES Cipher

The Substitution-Permutation Network (SPN) is a main type of structure in block ciphers. This paper proposes a new and practical differential fault attack technique on SPN structure. As an instance of SPN cipher, AES-256 can be recovered by 4 faulty ciphertexts. Compared with the previous techniques, our work can recover all subkeys of an SPN cipher with all key sizes. Therefore, our attacking ...

متن کامل

MitM Fault Analysis on Word-oriented SPN Block Ciphers.dvi

Meet-in-the-Middle (MitM) fault analysis is a kind of powerful cryptanalytic approach suitable for various block ciphers. When applying the method to analyze the security of block ciphers, it is very crucial to find effective MitM characteristics based on some fault models. In this paper, we investigate the security of word-oriented SPN block ciphers by means of MitM fault analysis, and observe...

متن کامل

Fault Analysis of Kuznyechik

Kuznyechik is an SPN block cipher that has been chosen recently to be standardized by the Russian federation as a new GOST cipher. In this paper, we present two fault analysis attacks on two different settings of the cipher. The first attack is a differential fault attack which employs the random byte fault model, where the attacker is assumed to be able to fault a random byte in rounds seven a...

متن کامل

DFA on LS-Designs with a Practical Implementation on SCREAM

LS-Designs are a family of SPN-based block ciphers whose linear layer is based on the so-called interleaved construction. They will be dedicated to low-end devices with high performance and low-resource constraints, objects which need to be resistant to physical attacks. In this paper we describe a complete Differential Fault Analysis against LS-Designs and also on other families of SPN-based b...

متن کامل

New Fixed Point Attacks on GOST2 Block Cipher

GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2018