Fault analysis of the PRINCE family of lightweight ciphers

被引:0
|
作者
Anup Kumar Kundu
Banashri Aikata
Dhiman Karmakar
机构
[1] Indian Statistical Institute,Department of Cryptology and Security
[2] Graz University of Technology,The Institute of Applied Information Processing and Communications (IAIK)
[3] Indian Institute of Technology Bhilai,de.ci.phe.red Lab, Department of Electrical Engineering and Computer Science
来源
关键词
PRINCE; PRINCEv2; Integral property; Diffusion; DFA; Fault attack;
D O I
暂无
中图分类号
学科分类号
摘要
In ASHES 2020 (Aikata et al., in: Proceedings of the 4th ACM workshop on attacks and solutions in hardware security workshop, ASHES@CCS 2020, virtual event, November 13, 2020, USA, ACM, 2020), new integral and slow diffusion trails were reported on PRINCE and were used to mount fault attacks with practical complexities. We extend this work by performing new differential fault attacks based on the popular random bit-flip fault model, which has not been looked at in isolation for PRINCE until today. Additionally, we look at the construction of PRINCEv2 reported in SAC 2020 in the light of the attacks developed in this work and find that PRINCEv2 is equally vulnerable to them. We also highlight an interesting aspect of fault-reflection, which amplifies the scope of fault injection on PRINCE-like ciphers. The bit-flip model can recover the key uniquely at the expense of 7 random bit-faults injected at the input of Round-10 with a time complexity of 221\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{21}$$\end{document}. The integral fault attack has a time complexity of 236\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{36}$$\end{document} and 220\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{20}$$\end{document} with 15 nibble faults in rounds 8.5 and 9.5, while the slow diffusion differential fault attack works with four bit-faults in the 10th round with a complexity of 222\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{22}$$\end{document}. The array of fault attacks presented in this work constitute a comprehensive account of fault attack vulnerability of both PRINCE and PRINCEv2. Moreover, the 3D visualization model of PRINCE state introduced can be used to extend or improve existing attacks on PRINCE.
引用
收藏
页码:475 / 494
页数:19
相关论文
共 50 条
  • [31] Performance analysis of current lightweight stream ciphers for constrained environments
    Deb, Subhrajyoti
    Bhuyan, Bubu
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2020, 45 (01):
  • [32] Performance analysis of current lightweight stream ciphers for constrained environments
    Subhrajyoti Deb
    Bubu Bhuyan
    Sādhanā, 2020, 45
  • [33] Differential Fault Analysis on the Families of SIMON and SPECK Ciphers
    Tupsamudre, Harshal
    Bisht, Shikha
    Mukhopadhyay, Debdeep
    2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 40 - 48
  • [34] Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers
    Beckers, Arthur
    Gierlichs, Benedikt
    Verbauwhede, Ingrid
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017), 2018, 10728 : 196 - 212
  • [35] Reflection Cryptanalysis of PRINCE-Like Ciphers
    Hadi Soleimany
    Céline Blondeau
    Xiaoli Yu
    Wenling Wu
    Kaisa Nyberg
    Huiling Zhang
    Lei Zhang
    Yanfeng Wang
    Journal of Cryptology, 2015, 28 : 718 - 744
  • [36] Reflection Cryptanalysis of PRINCE-Like Ciphers
    Soleimany, Hadi
    Blondeau, Celine
    Yu, Xiaoli
    Wu, Wenling
    Nyberg, Kaisa
    Zhang, Huiling
    Zhang, Lei
    Wang, Yanfeng
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 71 - 91
  • [37] HAIL: a family of high-diffusion lightweight block ciphers for internet of things security
    Deng, Chutian
    Li, Lang
    Feng, Jiayi
    Yan, Liuyan
    PHYSICA SCRIPTA, 2025, 100 (01)
  • [38] Semi-Permanent Stuck-At Fault injection attacks onElephant and GIFT lightweight ciphers
    Joshi, Priyanka
    Mazumdar, Bodhisatwa
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2024, 29 (04)
  • [39] Reflection Cryptanalysis of PRINCE-Like Ciphers
    Soleimany, Hadi
    Blondeau, Celine
    Yu, Xiaoli
    Wu, Wenling
    Nyberg, Kaisa
    Zhang, Huiling
    Zhang, Lei
    Wang, Yanfeng
    JOURNAL OF CRYPTOLOGY, 2015, 28 (03) : 718 - 744
  • [40] Harnessing Lightweight Ciphers for PDF Encryption
    Chauhan, Aastha
    Verma, Deepa
    arXiv,