Fault analysis of the PRINCE family of lightweight ciphers

被引:0
|
作者
Anup Kumar Kundu
Banashri Aikata
Dhiman Karmakar
机构
[1] Indian Statistical Institute,Department of Cryptology and Security
[2] Graz University of Technology,The Institute of Applied Information Processing and Communications (IAIK)
[3] Indian Institute of Technology Bhilai,de.ci.phe.red Lab, Department of Electrical Engineering and Computer Science
来源
关键词
PRINCE; PRINCEv2; Integral property; Diffusion; DFA; Fault attack;
D O I
暂无
中图分类号
学科分类号
摘要
In ASHES 2020 (Aikata et al., in: Proceedings of the 4th ACM workshop on attacks and solutions in hardware security workshop, ASHES@CCS 2020, virtual event, November 13, 2020, USA, ACM, 2020), new integral and slow diffusion trails were reported on PRINCE and were used to mount fault attacks with practical complexities. We extend this work by performing new differential fault attacks based on the popular random bit-flip fault model, which has not been looked at in isolation for PRINCE until today. Additionally, we look at the construction of PRINCEv2 reported in SAC 2020 in the light of the attacks developed in this work and find that PRINCEv2 is equally vulnerable to them. We also highlight an interesting aspect of fault-reflection, which amplifies the scope of fault injection on PRINCE-like ciphers. The bit-flip model can recover the key uniquely at the expense of 7 random bit-faults injected at the input of Round-10 with a time complexity of 221\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{21}$$\end{document}. The integral fault attack has a time complexity of 236\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{36}$$\end{document} and 220\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{20}$$\end{document} with 15 nibble faults in rounds 8.5 and 9.5, while the slow diffusion differential fault attack works with four bit-faults in the 10th round with a complexity of 222\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{22}$$\end{document}. The array of fault attacks presented in this work constitute a comprehensive account of fault attack vulnerability of both PRINCE and PRINCEv2. Moreover, the 3D visualization model of PRINCE state introduced can be used to extend or improve existing attacks on PRINCE.
引用
收藏
页码:475 / 494
页数:19
相关论文
共 50 条
  • [21] CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices
    Koo, Bonwook
    Roh, Dongyoung
    Kim, Hyeonjin
    Jung, Younghoon
    Lee, Dong-Geon
    Kwon, Daesung
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 3 - 25
  • [22] Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
    Heuser, Annelie
    Picek, Stjepan
    Guilley, Sylvain
    Mentens, Nele
    RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY, 2017, 10155 : 91 - 104
  • [23] Fault-Resilient Lightweight Cryptographic Block Ciphers for Secure Embedded Systems
    Mozaffari-Kermani, Mehran
    Tian, Kai
    Azarderakhsh, Reza
    Bayat-Sarmadi, Siavash
    IEEE EMBEDDED SYSTEMS LETTERS, 2014, 6 (04) : 89 - 92
  • [24] SELECTION AND JUSTIFICATION OF CRITERIA FOR COMPARATIVE ANALYSIS OF LIGHTWEIGHT CIPHERS
    Dimitrova, Dilyana
    MATHEMATICS AND INFORMATICS, 2023, 66 (05): : 534 - 542
  • [25] Performance analysis of CLEFIA and PRESENT lightweight block ciphers
    Jangra, Monika
    Singh, Buddha
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08): : 1489 - 1499
  • [26] A review of lightweight block ciphers
    George Hatzivasilis
    Konstantinos Fysarakis
    Ioannis Papaefstathiou
    Charalampos Manifavas
    Journal of Cryptographic Engineering, 2018, 8 : 141 - 184
  • [27] Electromagnetic Analysis Attack for a lightweight cipher PRINCE
    Yoshikawa, Masaya
    Nozaki, Yusuke
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBERCRIME AND COMPUTER FORENSIC (ICCCF), 2016,
  • [28] A review of lightweight block ciphers
    Hatzivasilis, George
    Fysarakis, Konstantinos
    Papaefstathiou, Ioannis
    Manifavas, Charalampos
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (02) : 141 - 184
  • [29] Algebraic fault analysis based on decomposition of higher-order nonlinear S-boxes in lightweight block ciphers
    Xing Fang
    Hongxin Zhang
    Xiaotong Cui
    Fan Fan
    Nonlinear Dynamics, 2023, 111 : 12371 - 12388
  • [30] Algebraic fault analysis based on decomposition of higher-order nonlinear S-boxes in lightweight block ciphers
    Fang, Xing
    Zhang, Hongxin
    Cui, Xiaotong
    Fan, Fan
    NONLINEAR DYNAMICS, 2023, 111 (13) : 12371 - 12388