Differential Fault Attack on Lightweight Block Cipher PIPO

被引:0
|
作者
Lim, Seonghyuck [1 ]
Han, Jaeseung [1 ]
Lee, Tae-Ho [1 ]
Han, Dong-Guk [1 ,2 ]
机构
[1] Kookmin Univ, Dept Financial Informat Secur, Seoul, South Korea
[2] Kookmin Univ, Dept Informat Secur Cryptol & Math, Seoul, South Korea
关键词
Side-channel analysis; Differential fault attack; Bit-sliced lightweight cipher; PIPO;
D O I
10.1007/978-3-031-08896-4_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the recent development of Internet of Things (IoT) devices, related security issues are also increasing. In particular, the possibility of accessing and hijacking cryptographic devices is also increasing due to the rapid increase in usage of these devices. Therefore, research on cryptographic technologies that can provide a safe environment even in resource-constrained environments has been actively conducted. Among them, there are increasing security issues of side-channel analysis for devices due to their physical accessibility. The lightweight block cipher PIPO was recently proposed in ICISC 2020 to address these issues. The PIPO has the characteristic of providing robust security strength while having less overhead when using the side-channel analysis countermeasures. A differential fault attack is a type of side-channel analysis that induces fault in cryptographic operations and utilizes difference information that occurs. Differential fault attacks on the PIPO have not yet been studied. This paper proposed a single-bit flip-based differential fault attack on the lightweight block cipher PIPO for the first time. We show that simulations enable the recovery of the correct secret key with about 98% probability through 64 fault ciphertexts. Therefore, the PIPO does not provide security against differential fault attacks. When using the PIPO cipher on IoT devices, designers must apply appropriate counter-measures against fault-injection attacks.
引用
收藏
页码:296 / 307
页数:12
相关论文
共 50 条
  • [41] Differential Collision Attack on Reduced FOX Block Cipher
    Chen Jie
    Hu Yupu
    Zhang Yueyu
    Dong Xiaoli
    CHINA COMMUNICATIONS, 2012, 9 (07) : 71 - 76
  • [42] Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32
    张文英
    刘枫
    刘宣
    孟帅
    JournalofShanghaiJiaotongUniversity(Science), 2013, 18 (02) : 147 - 152
  • [43] Differential attack on nine rounds of the SEED block cipher
    Lu, Jiqiang
    Yap, Wun-She
    Henricksen, Matt
    Heng, Swee-Huay
    INFORMATION PROCESSING LETTERS, 2014, 114 (03) : 116 - 123
  • [44] FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software
    Keerthi K.
    Rebeiro C.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 212 - 240
  • [45] Power Analysis Attack and Its Countermeasure for a Lightweight Block Cipher Simon
    Yoshikawa, Masaya
    Nozaki, Yusuke
    INFORMATION TECHNOLOGY: NEW GENERATIONS, 2016, 448 : 151 - 160
  • [46] Efficient Parallel Implementations of PIPO Block Cipher on CPU and GPU
    Choi, Hojin
    Seo, Seog Chung
    IEEE ACCESS, 2022, 10 : 85995 - 86007
  • [47] New differential cryptanalysis results for the lightweight block cipher BORON
    Teh, Je Sen
    Tham, Li Jing
    Jamil, Norziana
    Yap, Wun-She
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [48] Algebraic Differential Fault Analysis on SIMON Block Cipher
    Duc-Phong Le
    Yeo, Sze Ling
    Khoo, Khoongming
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (11) : 1561 - 1572
  • [49] Differential fault analysis about feistel block cipher
    Zhang, Boliang
    Li, Dong
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 1273 - 1276
  • [50] Efficient Parallel Implementations of PIPO Block Cipher on CPU and GPU
    Choi, Hojin
    Seo, Seog Chung
    IEEE Access, 2022, 10 : 85995 - 86007