Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things

被引:21
|
作者
Li, Wei [1 ,2 ,3 ,4 ]
Liao, Linfeng [5 ]
Gu, Dawu [2 ]
Li, Chaoyun [6 ]
Ge, Chenyu [5 ]
Guo, Zheng [7 ]
Liu, Ya [8 ]
Liu, Zhiqiang [2 ]
机构
[1] Donghua Univ, Sch Comp Sci & Technol, Shanghai 201620, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[3] Shanghai Key Lab Scalable Comp & Syst, Shanghai 200240, Peoples R China
[4] Shanghai Key Lab Integrate Adm Technol Informat S, Shanghai 200240, Peoples R China
[5] Donghua Univ, Sch Comp Sci & Technol, Shanghai 201620, Peoples R China
[6] Katholieke Univ Leuven, Imec COSIC, B-000 Leuven, Belgium
[7] Shanghai Jiao Tong Univ, Sch Microelect, Shanghai 200240, Peoples R China
[8] Univ Shanghai Sci & Technol, Dept Comp Sci & Engn, Shanghai 200093, Peoples R China
基金
中国国家自然科学基金; 欧盟地平线“2020”;
关键词
IoT; lightweight cryptosystem; LED; ciphertext-only fault analysis; BLOCK CIPHER;
D O I
10.1109/TDSC.2018.2857770
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the enlargement of wireless technology, Internet of Things (IoT) is emerging as a promising approach to realize smart cities and address lots of serious problems such as safety, convenience and efficiency. In order to avoid any possible rancorous attacks, employing lightweight cryptosystems is most effective to implement encryption/decryption, message authentication and digital signature for security of the IoT. LED is such a lightweight cipher with two flexible keysize variants in the IoT. Since its designing, a multitude of fault analysis techniques in chosen plaintext attacks focus on provoking faults on LED to derive the 64-bit and 128-bit secret keys. It is vital to investigate whether injecting faults allows breaking LED while the attackers have the weakest ciphertext-only attacking ability. This study presents ciphertext-only fault analysis with six different distinguishers on LED. The simulating experiments show that our analysis can recover its 64-bit and 128-bit secret keys with over 99 percent probability using the SEI, GF, GF-SEI, ML, HW and MAP distinguishers. The attack can not only improve the attacking efficiency, but also decrease the number of faults. The fault locations can be injected into the deeper round. It provides vital reference for security analysis of other lightweight ciphers in the IoT.
引用
收藏
页码:454 / 461
页数:8
相关论文
共 49 条
  • [11] Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm
    Li W.
    Wang M.
    Gu D.
    Li J.
    Cai T.
    Xu G.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 135 - 149
  • [12] Deep-learning-based ciphertext-only attack on optical scanning cryptosystem
    Zhuang, Xusheng
    Yan, Aimin
    OPTICS AND LASER TECHNOLOGY, 2023, 157
  • [13] Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things
    Li, Wei
    Zhang, Wenwen
    Gu, Dawu
    Tao, Zhi
    Zhou, Zhihong
    Liu, Ya
    Liu, Zhiqiang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (02): : 793 - 810
  • [14] An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things
    Li Wei
    Tao Zhi
    Gu Dawu
    Sun Li
    Qu Bo
    Liu Zhiqiang
    Liu Ya
    CHINA COMMUNICATIONS, 2014, 11 (06) : 129 - 139
  • [15] An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things
    LI Wei
    TAO Zhi
    GU Dawu
    SUN Li
    QU Bo
    LIU Zhiqiang
    LIU Ya
    中国通信, 2014, 11 (06) : 129 - 139
  • [16] Security analysis of the LED lightweight cipher in the internet of things
    Li, Wei
    Gu, Da-Wu
    Zhao, Chen
    Liu, Zhi-Qiang
    Liu, Ya
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (03): : 434 - 445
  • [17] Ciphertext-Only Attack on Linear Feedback Shift Register-Based Esmaeili-Gulliver Cryptosystem
    Lee, Yongwoo
    Kim, Young-Sik
    No, Jong-Seon
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (05) : 971 - 974
  • [18] Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem
    Dong, Liang
    Zhang, Hongxin
    Zhu, Lei
    Sun, Shaofei
    Gan, Han
    Zhang, Fan
    IEEE ACCESS, 2019, 7 : 31656 - 31662
  • [19] Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination based deep-learning correlography
    Wu, Huazheng
    Meng, Xiangfeng
    Yang, Xiulun
    Li, Xianye
    Wang, Pengwei
    He, Wenqi
    Chen, Hongyi
    OPTICS AND LASERS IN ENGINEERING, 2021, 138 (138)
  • [20] Ciphertext-only attack on the JTC-based cryptosystem with sizes and locations of the plaintext and the key code unknown
    Cai, Jianjun
    Shen, Xueju
    Wu, Huilong
    Lin, Chao
    APPLIED OPTICS, 2015, 54 (15) : 4760 - 4764