Differential fault analysis on the ARIA algorithm

被引:46
作者
Li, Wei [1 ]
Gu, Dawu [1 ]
Li, Juanru [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptoanalysis; side channel attacks; differential fault analysis; block ciphers; ARIA;
D O I
10.1016/j.ins.2008.05.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ARIA algorithm is a Korean Standard block cipher, which is optimized for lightweight environments. On the basis of the byte-oriented model and the differential analysis principle, we propose a differential fault attack on the ARIA algorithm. Mathematical analysis and simulating experiment show that our attack can recover its 128-bit secret key by introducing 45 faulty ciphertexts. Simultaneously, we also present a fault detection technique for protecting ARIA against this proposed analysis. We believe that our results in this study will also be beneficial to the analysis and protection of the same type of other iterated block ciphers. (C) 2008 Elsevier Inc. All rights reserved.
引用
收藏
页码:3727 / 3737
页数:11
相关论文
共 44 条
[1]   An efficient hardware-based fault diagnosis scheme for AES: Performances and cost [J].
Bertoni, G ;
Breveglieri, L ;
Koren, I ;
Maistri, P .
19TH IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI SYSTEMS, PROCEEDINGS, 2004, :130-138
[2]   Error analysis and detection procedures for a hardware implementation of the Advanced Encryption Standard [J].
Bertoni, G ;
Breveglieri, L ;
Koren, I ;
Maistri, P ;
Piuri, V .
IEEE TRANSACTIONS ON COMPUTERS, 2003, 52 (04) :492-505
[3]  
Biham E, 2005, LECT NOTES COMPUT SC, V3557, P359
[4]  
Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
[5]  
Biham E, 1999, LECT NOTES COMPUT SC, V1592, P12
[6]  
BIHAM E, 1991, J CRYPTOL, V4, P3, DOI DOI 10.1007/BF00630563
[7]  
Biryukov A, 1999, LECT NOTES COMPUT SC, V1636, P245
[8]  
Biryukov A, 2000, LECT NOTES COMPUT SC, V1807, P589
[9]  
Biryukov Alex, 2004, SECURITY PERFORMANCE
[10]  
Blömer J, 2003, LECT NOTES COMPUT SC, V2742, P162