DocumentCode
71179
Title
Differential fault analysis on PRINTcipher
Author
Bagheri, Nasour ; Ebrahimpour, Reza ; Ghaedi, Navid
Author_Institution
Electr. Eng. Dept., Shahid Rajaee Teacher Training Univ., Tehran, Iran
Volume
2
Issue
1
fYear
2013
fDate
Mar-13
Firstpage
30
Lastpage
36
Abstract
The new block cipher PRINTCIPHER was introduced in CHES 2010 as a lightweight block cipher for `integrated circuit´ or IC-`printing´ technology. The key of PRINTCIPHER consist of two sub-key components where the first sub-key is `XORed´ to the state in each round, whereas the second sub-key is used to generate the key-dependent permutations. In this study, the authors describe a new differential fault analysis on the lightweight block cipher PRINTcipher. The authors present two different fault models for obtaining each sub-key. The first fault model is used to obtain the second sub-key, which induces a fault on the key-dependent permutation layer so, on average, key search space is reduced from 232 to 214, given 36 faulty cipher texts. To obtain the first sub-key, the authors induce a fault on an intermediate results then they obtain, on average, 42 bits of the first sub-key with less than 24 faulty cipher texts. In total, on average, they reduce key search space of PRINTcipher from 280 to 220, given 60 faulty cipher texts. They also simulated their attack on a 1.8 GHz Celeron PC.
Keywords
cryptography; fault tolerant computing; Celeron PC; IC-printing technology; PRINTCIPHER; differential fault analysis; faulty cipher text; integrated circuit; key-dependent permutation layer; lightweight block cipher;
fLanguage
English
Journal_Title
Networks, IET
Publisher
iet
ISSN
2047-4954
Type
jour
DOI
10.1049/iet-net.2012.0117
Filename
6518002
Link To Document