Title :
Improved Differential Fault Analysis of CLEFIA
Author :
Ali, Sk Subidh ; Mukhopadhyay, Debdeep
Author_Institution :
CRISSP-AD, New York Univ. Abu Dhabi, Abu Dhabi, Saudi Arabia
Abstract :
CLEFIA is already shown to be vulnerable to differential fault analysis (DFA). The existing state-of-the-art DFA shows that two faults are enough to break CLEFIA-128, whereas for CLEFIA-192 and CLEFIA-256 ten faults are needed. Side-by-side it emphasizes the need for protecting last four rounds of the cipher in order to make it secure against the attack. In this paper we propose an improved DFA on CLEFIA. The analysis shows that an attack is possible even if the last four rounds of CLEFIA are protected against DFA. Further, the proposed attacks on CLEFIA-192 and CLEFIA-256 show that 8 faults are sufficient to successfully retrieve the 192 and 256-bit key respectively. The work shows improvement over the previous work. Extensive simulation results have been presented to validate the proposed attack. The simulation results show that the attack can retrieve the 128-bit secret key in around one minute of execution time whereas the attack on 192 and 256-bit key requires around one second to retrieve the secret key.
Keywords :
cryptography; fault diagnosis; CLEFIA-128; CLEFIA-192; CLEFIA-256; DFA; cipher; differential fault analysis; fault attack; secret key; word length 192 bit; word length 256 bit; Ciphers; Circuit faults; Doped fiber amplifiers; Encryption; Equations; Hardware; CLEFIA; DFA; Differential Fault Analysis; Fault Attack; Generalized Feistel Structure;
Conference_Titel :
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on
Conference_Location :
Santa Barbara, CA
Print_ISBN :
978-0-7695-5059-6
DOI :
10.1109/FDTC.2013.11