Improved Differential Fault Attack on the Block Cipher SPECK

被引:9
|
作者
Huo, Yuming [1 ,2 ]
Zhang, Fan [3 ]
Feng, Xiutao [1 ,3 ]
Wang, Li-Ping [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Data Assurance & Commun Secur Res Ctr, Beijing, Peoples R China
[3] Chinese Acad Sci, Acad Math & Syst Sci, Key Lab Math Mech, Beijing, Peoples R China
关键词
Block Ciphers; SPECK; Differential Fault Attack; Grobner Bases;
D O I
10.1109/FDTC.2015.15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
SPECK is a family of lightweight block ciphers published by the U.S. National Security Agency in 2013. The SPECK family consists of 10 versions, supporting a wide range of block and key sizes. Recently H. Tupsamudre et al. gave an approach to recovering the last round key of SPECK family with n/3 fault injections, where 2n is the block size. In this paper, we present two improved differential fault attacks on the SPECK family under different fault models. The first attack assumes a more practical random fault model and recovers the last round key with about 5 similar to 8 fault injections on all versions with different block sizes, which is far less than that of H. Tupsamudre et al.'s attack. The second attack only requires 4 specific faults to recover the last round key (except the most significant bit) over an arbitrary block size under a chosen-value fault model.
引用
收藏
页码:28 / 34
页数:7
相关论文
共 50 条
  • [21] Quantum Annealing and Algebraic Attack on Speck Cipher
    Burek, Elzbieta
    Wronski, Michal
    COMPUTATIONAL SCIENCE, ICCS 2022, PT IV, 2022, : 143 - 149
  • [22] The differential fault analysis on block cipher FeW
    Haiyan Xiao
    Lifang Wang
    Jinyong Chang
    Cybersecurity, 5
  • [23] Differential fault analysis on block cipher SEED
    Jeong, Kitae
    Lee, Yuseop
    Sung, Jaechul
    Hong, Seokhie
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 26 - 34
  • [24] The differential fault analysis on block cipher FeW
    Xiao, Haiyan
    Wang, Lifang
    Chang, Jinyong
    CYBERSECURITY, 2022, 5 (01)
  • [25] New Differential Fault Attack on Lightweight Cipher LBlock
    Wei, Yuechuan
    Rong, Yisheng
    Wang, Xu An
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 285 - 288
  • [26] Differential fault analysis and meet-in-the-middle attack on the block cipher KATAN32
    Zhang W.-Y.
    Liu F.
    Liu X.
    Meng S.
    Journal of Shanghai Jiaotong University (Science), 2013, Shanghai Jiaotong University (18): : 147 - 152
  • [27] Differential Collision Attack on Reduced FOX Block Cipher
    Chen Jie
    Hu Yupu
    Zhang Yueyu
    Dong Xiaoli
    CHINA COMMUNICATIONS, 2012, 9 (07) : 71 - 76
  • [28] Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32
    张文英
    刘枫
    刘宣
    孟帅
    JournalofShanghaiJiaotongUniversity(Science), 2013, 18 (02) : 147 - 152
  • [29] Differential attack on nine rounds of the SEED block cipher
    Lu, Jiqiang
    Yap, Wun-She
    Henricksen, Matt
    Heng, Swee-Huay
    INFORMATION PROCESSING LETTERS, 2014, 114 (03) : 116 - 123
  • [30] FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software
    Keerthi K.
    Rebeiro C.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 212 - 240