Differential fault attack on ITUbee block cipher

Shan Fu, Guoai Xu, Juan Pan, Zongyue Wang*, An Wang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)

Abstract

Differential Fault Attack (DFA) is a powerful cryptanalytic technique to retrieve secret keys by exploiting the faulty ciphertexts generated during encryption procedure. This article proposes a novel DFA attack that is effective on ITUbee, a software-oriented block cipher for resource-constrained devices. Different from other DFA, our attack makes use of not only faulty values, but also differences between fault-free intermediate values corresponding to 2 plaintexts, which combine traditional differential analysis with DFA. The possible injection positions with different number of faults are discussed. The most efficient attack takes 225 round function operations with 4 faults, which is achieved in a few seconds on a PC.

Original languageEnglish
Article number54
JournalTransactions on Embedded Computing Systems
Volume16
Issue number2
DOIs
Publication statusPublished - Dec 2016

Keywords

  • Differential fault attack
  • ITUbee

Fingerprint

Dive into the research topics of 'Differential fault attack on ITUbee block cipher'. Together they form a unique fingerprint.

Cite this