Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys
スポンサーリンク
概要
- 論文の詳細を見る
This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.
- 2010-01-01
著者
-
Takahashi Junko
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Fukunaga Toshinori
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Takahashi Junko
Ntt Information Sharing Platform Laboratories Nippon Telegraph And Telephone Corp.
関連論文
- Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys
- Differential Fault Analysis on Stream Cipher MUGI