Fault-based analysis of flexible ciphers

We consider security of some flexible ciphers against differential fault analysis (DFA). We present a description of the fault-based attack on two kinds of the flexible ciphers. The first kind is represented by the fast software-oriented cipher based on data-dependent subkey selection (DDSS), in whi...

Full description

Bibliographic Details
Main Authors: V.I.Korjik, A.Mukherjii, M.A.Eremeev, N.A.Moldovyan
Format: Article
Language:English
Published: Institute of Mathematics and Computer Science of the Academy of Sciences of Moldova 2002-07-01
Series:Computer Science Journal of Moldova
Subjects:
Online Access:http://www.math.md/nrofdownloads.php?file=/files/csjm/v10-n2/v10-n2-(pp223-236).pdf
id doaj-f6a95e0dfe40403d913452a01873c2de
record_format Article
spelling doaj-f6a95e0dfe40403d913452a01873c2de2020-11-25T00:53:09ZengInstitute of Mathematics and Computer Science of the Academy of Sciences of MoldovaComputer Science Journal of Moldova1561-40422002-07-01102(29)223236Fault-based analysis of flexible ciphersV.I.Korjik0A.Mukherjii1M.A.Eremeev2N.A.Moldovyan3CINVESTAV-IPN,Ingeneria Electrica Department, AV.IPN No.2508 ESQ Ticoman Col. San Pedro Zacatenco, C.P.07000, Mexico, D.F., MexicoItel Technologies Limited, UK, London SW11 3AD, 2 Old Garden House, The Lanterns, Bridge LaneSpecialized Center of Program Systems SPECTR, Kantemirovskaya Str., 10, St-Petersburg 197342, RussiaSpecialized Center of Program Systems SPECTR, Kantemirovskaya Str., 10, St-Petersburg 197342, RussiaWe consider security of some flexible ciphers against differential fault analysis (DFA). We present a description of the fault-based attack on two kinds of the flexible ciphers. The first kind is represented by the fast software-oriented cipher based on data-dependent subkey selection (DDSS), in which flexibility corresponds to the use of key-dependent operations. The second kind is represented by a DES-like cryptosystem GOST with secrete S-boxes. In general, the use of some secrete operations and procedures contributes to the security of the cryptosystem, however degree of this contribution depends significantly on the structure of the encryption mechanism. It is shown how to attack the DDSS-based flexible cipher using DFA though this cipher is secure against standard variants of the differential and linear cryptanalysis. We also give an outline of ciphers RC5 and GOST showing that they are also insecure against DFA-based attack. We suggest also a modification of the DDSS mechanism and a variant of the advanced DDSS-based flexible cipher that is secure against attacks based on random hardware faults. http://www.math.md/nrofdownloads.php?file=/files/csjm/v10-n2/v10-n2-(pp223-236).pdfFlexible cipherblock cipherdifferential fault analysis
collection DOAJ
language English
format Article
sources DOAJ
author V.I.Korjik
A.Mukherjii
M.A.Eremeev
N.A.Moldovyan
spellingShingle V.I.Korjik
A.Mukherjii
M.A.Eremeev
N.A.Moldovyan
Fault-based analysis of flexible ciphers
Computer Science Journal of Moldova
Flexible cipher
block cipher
differential fault analysis
author_facet V.I.Korjik
A.Mukherjii
M.A.Eremeev
N.A.Moldovyan
author_sort V.I.Korjik
title Fault-based analysis of flexible ciphers
title_short Fault-based analysis of flexible ciphers
title_full Fault-based analysis of flexible ciphers
title_fullStr Fault-based analysis of flexible ciphers
title_full_unstemmed Fault-based analysis of flexible ciphers
title_sort fault-based analysis of flexible ciphers
publisher Institute of Mathematics and Computer Science of the Academy of Sciences of Moldova
series Computer Science Journal of Moldova
issn 1561-4042
publishDate 2002-07-01
description We consider security of some flexible ciphers against differential fault analysis (DFA). We present a description of the fault-based attack on two kinds of the flexible ciphers. The first kind is represented by the fast software-oriented cipher based on data-dependent subkey selection (DDSS), in which flexibility corresponds to the use of key-dependent operations. The second kind is represented by a DES-like cryptosystem GOST with secrete S-boxes. In general, the use of some secrete operations and procedures contributes to the security of the cryptosystem, however degree of this contribution depends significantly on the structure of the encryption mechanism. It is shown how to attack the DDSS-based flexible cipher using DFA though this cipher is secure against standard variants of the differential and linear cryptanalysis. We also give an outline of ciphers RC5 and GOST showing that they are also insecure against DFA-based attack. We suggest also a modification of the DDSS mechanism and a variant of the advanced DDSS-based flexible cipher that is secure against attacks based on random hardware faults.
topic Flexible cipher
block cipher
differential fault analysis
url http://www.math.md/nrofdownloads.php?file=/files/csjm/v10-n2/v10-n2-(pp223-236).pdf
work_keys_str_mv AT vikorjik faultbasedanalysisofflexibleciphers
AT amukherjii faultbasedanalysisofflexibleciphers
AT maeremeev faultbasedanalysisofflexibleciphers
AT namoldovyan faultbasedanalysisofflexibleciphers
_version_ 1725238960978919424