Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things

被引:0
|
作者
Li W. [1 ,2 ,3 ,4 ]
Cao S. [1 ]
Gu D. [2 ]
Li J. [1 ]
Wang M. [1 ]
Cai T. [1 ]
Shi X. [1 ]
机构
[1] School of Computer Science and Technology, Donghua University, Shanghai
[2] Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai
[3] Shanghai Key Laboratory of Scalable Computing and Systems (Shanghai Jiao Tong University), Shanghai
[4] Shanghai Key Laboratory of Integrate Administration Technologies for Information Security (Shanghai Jiao Tong University), Shanghai
基金
中国国家自然科学基金;
关键词
Ciphertext-only fault analysis; Distinguisher; Internet of things; Lightweight cryptosystem; MIBS;
D O I
10.7544/issn1000-1239.2019.20190406
中图分类号
学科分类号
摘要
The lightweight cryptosystem MIBS was proposed at the CANS conference in 2009. It has high efficiency in both hardware implementation and software implementation. MIBS can resist against classical cryptanalysis, such as differential analysis and linear analysis, etc. It is suitable for the resource-limited devices in the Internet of things. This paper proposes new ciphertext-only fault analysis of the MIBS cryptosystem. The attackers can apply a new fault model of Double AND and two novel distinguishers of Parzen-HW and Parzen-HW-MLE to break MIBS. The experiments only require at least 72 fault injections to recover the secret key with a success probability of no less than 99%. The method can further reduce fault injections and time, and effectively improve the attacking efficiency. It shows that the ciphertext-only fault analysis poses a serious threaten to the security of MIBS. The research also provides an important reference for the security analysis of other lightweight cryptosystems. © 2019, Science Press. All right reserved.
引用
收藏
页码:2216 / 2228
页数:12
相关论文
共 24 条
  • [1] Zamanifar A., Nazemi E., An approach for predicting health status in IoT health care, Journal of Network and Computer Applications, 134, 15, pp. 100-113, (2014)
  • [2] Garcia M.I., Gonzalez L.F., Collaboration of smart IoT devices exemplified with smart cupboards, IEEE Access, 7, 1, pp. 9881-9892, (2019)
  • [3] Muangprathub J., Boonnam N., Kajornkasirat S., Et al., IoT and agriculture data analysis for smart farm, Computers and Electronics in Agriculture, 156, 1, pp. 467-474, (2019)
  • [4] Gope P., Sikdar B., Lightweight and privacy-preserving two-factor authentication scheme for IoT devices, IEEE Internet of Things Journal, 6, 1, pp. 580-589, (2019)
  • [5] Tiburski R.T., Moratelli C.R., Filho S.J., Et al., Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices, IEEE Communications Magazine, 57, 2, pp. 67-73, (2019)
  • [6] Lzadi M., Sadeghiyan B., Sadeghian S.S., Et al., MIBS: A new lightweight block cipher, Proc of the 8th Int Conf on Cryptology and Network Security, pp. 334-348, (2009)
  • [7] Wu W., Zhang L., LBlock: A lightweight block cipher, Proc of the 9th Int Conf on Applied Cryptography and Network Security, pp. 327-344, (2011)
  • [8] Beaulieu R., Shors D., Smith J., Et al., The SIMON and SPECK families of lightweight block ciphers, IACR Cryptology ePrint Archive, 2013, 1, pp. 404-449, (2013)
  • [9] Yang G., Zhu B., Suder V., Et al., The simeck family of lightweight block ciphers, Proc of the 17th Int Workshop on Cryptographic Hardware and Embedded Systems, pp. 307-329, (2015)
  • [10] Duan D., Wei H., Collision attack on MIBS algorithm, Computer Science, 45, 2, pp. 222-225, (2018)