DocumentCode :
2259117
Title :
Differential Fault Analysis on PRESENT Key Schedule
Author :
Wang, Gaoli ; Wang, Shaohui
Author_Institution :
Sch. of Comput. Sci. & Technol., Donghua Univ., Shanghai, China
fYear :
2010
fDate :
11-14 Dec. 2010
Firstpage :
362
Lastpage :
366
Abstract :
PRESENT is a lightweight block cipher designed by A. Bogdanov et al. in 2007 for extremely constrained environments such as RFID tags and sensor networks, where the AES is not suitable for. In this paper, the strength of PRESENT against the differential fault attack on the key schedule is explored. Our attack adopts the nibble oriented model of random faults and assumes that the attacker can induce a single nibble fault on the round key. The attack can efficiently recover the secret key with the computational complexity of 229, and sixty-four pairs of correct and faulty ciphertexts on average.
Keywords :
cryptography; fault diagnosis; radiofrequency identification; PRESENT key schedule; RFID tags; block cipher; computational complexity; differential fault analysis; differential fault attack; extremely constrained environment; faulty ciphertext; nibble fault; nibble oriented model; random fault; round key; secret key recovery; sensor networks; PRESENT; block cipher; differential fault analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security (CIS), 2010 International Conference on
Conference_Location :
Nanning
Print_ISBN :
978-1-4244-9114-8
Electronic_ISBN :
978-0-7695-4297-3
Type :
conf
DOI :
10.1109/CIS.2010.84
Filename :
5696299
Link To Document :
بازگشت