Fault-based analysis of flexible ciphers
We consider security of some flexible ciphers against differential fault analysis (DFA). We present a description of the fault-based attack on two kinds of the flexible ciphers. The first kind is represented by the fast software-oriented cipher based on data-dependent subkey selection (DDSS), in whi...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Mathematics and Computer Science of the Academy of Sciences of Moldova
2002-07-01
|
Series: | Computer Science Journal of Moldova |
Subjects: | |
Online Access: | http://www.math.md/nrofdownloads.php?file=/files/csjm/v10-n2/v10-n2-(pp223-236).pdf |
id |
doaj-f6a95e0dfe40403d913452a01873c2de |
---|---|
record_format |
Article |
spelling |
doaj-f6a95e0dfe40403d913452a01873c2de2020-11-25T00:53:09ZengInstitute of Mathematics and Computer Science of the Academy of Sciences of MoldovaComputer Science Journal of Moldova1561-40422002-07-01102(29)223236Fault-based analysis of flexible ciphersV.I.Korjik0A.Mukherjii1M.A.Eremeev2N.A.Moldovyan3CINVESTAV-IPN,Ingeneria Electrica Department, AV.IPN No.2508 ESQ Ticoman Col. San Pedro Zacatenco, C.P.07000, Mexico, D.F., MexicoItel Technologies Limited, UK, London SW11 3AD, 2 Old Garden House, The Lanterns, Bridge LaneSpecialized Center of Program Systems SPECTR, Kantemirovskaya Str., 10, St-Petersburg 197342, RussiaSpecialized Center of Program Systems SPECTR, Kantemirovskaya Str., 10, St-Petersburg 197342, RussiaWe consider security of some flexible ciphers against differential fault analysis (DFA). We present a description of the fault-based attack on two kinds of the flexible ciphers. The first kind is represented by the fast software-oriented cipher based on data-dependent subkey selection (DDSS), in which flexibility corresponds to the use of key-dependent operations. The second kind is represented by a DES-like cryptosystem GOST with secrete S-boxes. In general, the use of some secrete operations and procedures contributes to the security of the cryptosystem, however degree of this contribution depends significantly on the structure of the encryption mechanism. It is shown how to attack the DDSS-based flexible cipher using DFA though this cipher is secure against standard variants of the differential and linear cryptanalysis. We also give an outline of ciphers RC5 and GOST showing that they are also insecure against DFA-based attack. We suggest also a modification of the DDSS mechanism and a variant of the advanced DDSS-based flexible cipher that is secure against attacks based on random hardware faults. http://www.math.md/nrofdownloads.php?file=/files/csjm/v10-n2/v10-n2-(pp223-236).pdfFlexible cipherblock cipherdifferential fault analysis |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
V.I.Korjik A.Mukherjii M.A.Eremeev N.A.Moldovyan |
spellingShingle |
V.I.Korjik A.Mukherjii M.A.Eremeev N.A.Moldovyan Fault-based analysis of flexible ciphers Computer Science Journal of Moldova Flexible cipher block cipher differential fault analysis |
author_facet |
V.I.Korjik A.Mukherjii M.A.Eremeev N.A.Moldovyan |
author_sort |
V.I.Korjik |
title |
Fault-based analysis of flexible ciphers |
title_short |
Fault-based analysis of flexible ciphers |
title_full |
Fault-based analysis of flexible ciphers |
title_fullStr |
Fault-based analysis of flexible ciphers |
title_full_unstemmed |
Fault-based analysis of flexible ciphers |
title_sort |
fault-based analysis of flexible ciphers |
publisher |
Institute of Mathematics and Computer Science of the Academy of Sciences of Moldova |
series |
Computer Science Journal of Moldova |
issn |
1561-4042 |
publishDate |
2002-07-01 |
description |
We consider security of some flexible ciphers against differential fault analysis (DFA). We present a description of the fault-based attack on two kinds of the flexible ciphers. The first kind is represented by the fast software-oriented cipher based on data-dependent subkey selection (DDSS), in which flexibility corresponds to the use of key-dependent operations. The second kind is represented by a DES-like cryptosystem GOST with secrete S-boxes. In general, the use of some secrete operations and procedures contributes to the security of the cryptosystem, however degree of this contribution depends significantly on the structure of the encryption mechanism. It is shown how to attack the DDSS-based flexible cipher using DFA though this cipher is secure against standard variants of the differential and linear cryptanalysis. We also give an outline of ciphers RC5 and GOST showing that they are also insecure against DFA-based attack. We suggest also a modification of the DDSS mechanism and a variant of the advanced DDSS-based flexible cipher that is secure against attacks based on random hardware faults. |
topic |
Flexible cipher block cipher differential fault analysis |
url |
http://www.math.md/nrofdownloads.php?file=/files/csjm/v10-n2/v10-n2-(pp223-236).pdf |
work_keys_str_mv |
AT vikorjik faultbasedanalysisofflexibleciphers AT amukherjii faultbasedanalysisofflexibleciphers AT maeremeev faultbasedanalysisofflexibleciphers AT namoldovyan faultbasedanalysisofflexibleciphers |
_version_ |
1725238960978919424 |