Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32

被引:1
|
作者
张文英 [1 ,2 ]
刘枫 [1 ]
刘宣 [1 ]
孟帅 [1 ]
机构
[1] School of Information Science and Engineering,Shandong Normal University
[2] State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences
基金
中国国家自然科学基金;
关键词
KATAN32; differential fault analysis; meet-in-the-middle (MITM) attack; block cipher; lightweight cipher;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same key length of 80 bits. On the basis of the bit-oriented faulty model and the differential analysis principle, we describe the attack that combines differential fault attack with the meet-in-the-middle (MITM) attack on the KATAN32. More precisely, inducing a fault at a bit, we can recover some linear differential fault equations on the key bits. During solving equations, without the help of computer, we need only algebraic deduction to obtain relations of some key bits. The complexity in this process is neglectable. The secret key of the full cipher can be recovered faster than exhaustive search for all three block sizes in the KATAN family. Our result describes that KATAN32 is vulnerable.
引用
收藏
页码:147 / 152
页数:6
相关论文
共 50 条
  • [1] Differential fault analysis and meet-in-the-middle attack on the block cipher KATAN32
    Zhang W.-Y.
    Liu F.
    Liu X.
    Meng S.
    Journal of Shanghai Jiaotong University (Science), 2013, Shanghai Jiaotong University (18): : 147 - 152
  • [2] Differential Fault Attack and Meet-in-the-Middle Attack on Block Cipher LED
    Liu, Feng
    Liu, Xuan
    Meng, Shuai
    ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 529 - 532
  • [3] Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
    Zhu, Bo
    Gong, Guang
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 6 (04): : 313 - 333
  • [4] Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
    Bo Zhu
    Guang Gong
    Cryptography and Communications, 2014, 6 : 313 - 333
  • [5] Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher
    Kang, Yongze
    Yu, Qingyuan
    Qin, Lingyue
    Zhang, Guoyan
    SYMMETRY-BASEL, 2023, 15 (06):
  • [6] Meet-in-the-middle attack on TWINE block cipher
    Wang, Yan-Feng
    Wu, Wen-Ling
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (10): : 2684 - 2695
  • [7] A new meet-in-the-middle attack on the IDEA block cipher
    Demirci, H
    Selçuk, AA
    Türe, E
    SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 117 - 129
  • [8] Improved Conditional Differential Analysis on NLFSR-Based Block Cipher KATAN32 with MILP
    Xing, Zhaohui
    Zhang, Wenying
    Han, Guoyong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [9] Match Box Meet-in-the-Middle Attack Against KATAN
    Fuhr, Thomas
    Minaud, Brice
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 61 - 81
  • [10] 3-subset meet-in-the-middle attack on block cipher TWIS
    Zheng, Y.-F., 1600, Editorial Board of Journal on Communications (35):