会议专题

Fault-Propagate Pattern Based DFA on PRESENT and PRINTcipher

  This article proposes an enhanced differential fault analysis (DFA) method named as fault-propagation pattern-based DFA (FPP-DFA).The main idea of FPP-DFA is using the FPP of the ciphertext difference to predict the fault location and the fault-propagation path.It shows that FPP-DFA is very effective on SPN structure block ciphers using bitwise permutation,which is applied to two block ciphers.The first is PRESENT with the substitution-permutation sequence.With the fault model of injecting one nibble fault into the r-2nd round,on average 8 and 16 faults can reduce the key search space of PRESENT-80/128 to 214.7 and 221.1,respectively.The second is PRINTcipher with the permutation-substitution sequence.For the first time,it shows that although the permutation of PRINTcipher is secret key dependent,FPP-DFA still works well on it.With the fault model of injecting one nibble fault into the r-2nd round,12 and 24 effective faults can reduce the key search space of PRINTcipher48/96 to 213.7 and 222.8,respectively.

fault-propagation pattern differential fault analysis bitwise permutation SPN block cipher PRESENT PRINTcipher

ZHAO Xinjie GUO Shize WANG Tao ZHANG Fan SHI Zhijie

Department of Computer Engineering,Ordnance Engineering College,Shijiazhuang 050003,Hebei,China The Institute of North Electronic Equipment,Beijing 100083,China Department of Computer Science and Engineering,University of Connecticut,Storrs 06269,USA

国内会议

第六届中国可信计算与信息安全学术会议

福州

英文

485-493

2012-10-27(万方平台首次上网日期,不代表论文的发表时间)