Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things

被引:6
|
作者
Li, Wei [1 ,2 ,3 ,4 ]
Zhang, Wenwen [1 ]
Gu, Dawu [2 ]
Tao, Zhi [1 ]
Zhou, Zhihong [4 ,5 ]
Liu, Ya [2 ,6 ]
Liu, Zhiqiang [2 ]
机构
[1] Donghua Univ, Sch Comp Sci & Technol, Shanghai 201620, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Shanghai Key Lab Integrate Adm Technol Informat S, Shanghai 200240, Peoples R China
[5] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
[6] Univ Shanghai Sci & Technol, Dept Comp Sci & Engn, Shanghai 200093, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Internet of Things; Cryptanalysis; Lightweight Cryptosystem; Differential Fault Analysis; TWINE; DIFFERENTIAL FAULT ANALYSIS; CRYPTANALYSIS;
D O I
10.3837/tiis.2015.02.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The TWINE is a new Generalized Feistel Structure (GFS) lightweight cryptosystem in the Internet of Things. It has 36 rounds and the key lengths support 80 bits and 128 bits, which are flexible to provide security for the RFID, smart cards and other highly-constrained devices. Due to the strong attacking ability, fast speed, simple implementation and other characteristics, the differential fault analysis has become an important method to evaluate the security of lightweight cryptosystems. On the basis of the 4-bit fault model and the differential analysis, we propose an effective differential fault attack on the TWINE cryptosystem. Mathematical analysis and simulating experiments show that the attack could recover its 80-bit and 128-bit secret keys by introducing 8 faulty ciphertexts and 18 faulty ciphertexts on average, respectively. The result in this study describes that the TWINE is vulnerable to differential fault analysis. It will be beneficial to the analysis of the same type of other iterated lightweight cryptosystems in the Internet of Things.
引用
收藏
页码:793 / 810
页数:18
相关论文
共 50 条
  • [31] Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network
    Li, Wei
    Liao, Linfeng
    Gu, Dawu
    Ge, Chenyu
    Gao, Zhiyong
    Zhou, Zhihong
    Guo, Zheng
    Liu, Ya
    Liu, Zhiqiang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 476 - 496
  • [32] The Analysis and Research on the Internet of Things Security Issues
    Xu, Xinyue
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS, NETWORK AND COMPUTER ENGINEERING (ICENCE 2016), 2016, 67 : 461 - 464
  • [33] Security analysis of a proposed internet of things middleware
    Hiro Gabriel Cerqueira Ferreira
    Rafael Timoteo de Sousa Junior
    Cluster Computing, 2017, 20 : 651 - 660
  • [34] Security Threats Analysis and Considerations for Internet of Things
    Lee, Yunjung
    Park, Yongjoon
    Kim, DoHyeun
    2015 8TH INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY (SECTECH), 2015, : 28 - 30
  • [35] Taxonomy and analysis of security protocols for Internet of Things
    Das, Ashok Kumar
    Zeadally, Sherali
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 110 - 125
  • [36] A Security Analysis Method for Industrial Internet of Things
    Mouratidis, Haralambos
    Diamantopoulou, Vasiliki
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (09) : 4093 - 4100
  • [37] Internet of Things Security Analysis of Smart Campus
    Wang, Lei
    Li, Kunqin
    Chen, Xianxiang
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 418 - 428
  • [38] A framework for automating security analysis of the internet of things
    Ge, Mengmeng
    Hong, Jin B.
    Guttmann, Walter
    Kim, Dong Seong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 83 : 12 - 27
  • [39] Security analysis of a proposed internet of things middleware
    Cerqueira Ferreira, Hiro Gabriel
    de Sousa Junior, Rafael Timoteo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (01): : 651 - 660
  • [40] A lightweight hierarchical method for improving security in the internet of things using fuzzy logic
    Doostani, Shadi
    Barati, Hamid
    Barati, Ali
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (06):