DocumentCode
3398505
Title
Improved Differential Fault Analysis of CLEFIA
Author
Ali, Sk Subidh ; Mukhopadhyay, Debdeep
Author_Institution
CRISSP-AD, New York Univ. Abu Dhabi, Abu Dhabi, Saudi Arabia
fYear
2013
fDate
20-20 Aug. 2013
Firstpage
60
Lastpage
70
Abstract
CLEFIA is already shown to be vulnerable to differential fault analysis (DFA). The existing state-of-the-art DFA shows that two faults are enough to break CLEFIA-128, whereas for CLEFIA-192 and CLEFIA-256 ten faults are needed. Side-by-side it emphasizes the need for protecting last four rounds of the cipher in order to make it secure against the attack. In this paper we propose an improved DFA on CLEFIA. The analysis shows that an attack is possible even if the last four rounds of CLEFIA are protected against DFA. Further, the proposed attacks on CLEFIA-192 and CLEFIA-256 show that 8 faults are sufficient to successfully retrieve the 192 and 256-bit key respectively. The work shows improvement over the previous work. Extensive simulation results have been presented to validate the proposed attack. The simulation results show that the attack can retrieve the 128-bit secret key in around one minute of execution time whereas the attack on 192 and 256-bit key requires around one second to retrieve the secret key.
Keywords
cryptography; fault diagnosis; CLEFIA-128; CLEFIA-192; CLEFIA-256; DFA; cipher; differential fault analysis; fault attack; secret key; word length 192 bit; word length 256 bit; Ciphers; Circuit faults; Doped fiber amplifiers; Encryption; Equations; Hardware; CLEFIA; DFA; Differential Fault Analysis; Fault Attack; Generalized Feistel Structure;
fLanguage
English
Publisher
ieee
Conference_Titel
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on
Conference_Location
Santa Barbara, CA
Print_ISBN
978-0-7695-5059-6
Type
conf
DOI
10.1109/FDTC.2013.11
Filename
6623556
Link To Document