• DocumentCode
    71179
  • Title

    Differential fault analysis on PRINTcipher

  • Author

    Bagheri, Nasour ; Ebrahimpour, Reza ; Ghaedi, Navid

  • Author_Institution
    Electr. Eng. Dept., Shahid Rajaee Teacher Training Univ., Tehran, Iran
  • Volume
    2
  • Issue
    1
  • fYear
    2013
  • fDate
    Mar-13
  • Firstpage
    30
  • Lastpage
    36
  • Abstract
    The new block cipher PRINTCIPHER was introduced in CHES 2010 as a lightweight block cipher for `integrated circuit´ or IC-`printing´ technology. The key of PRINTCIPHER consist of two sub-key components where the first sub-key is `XORed´ to the state in each round, whereas the second sub-key is used to generate the key-dependent permutations. In this study, the authors describe a new differential fault analysis on the lightweight block cipher PRINTcipher. The authors present two different fault models for obtaining each sub-key. The first fault model is used to obtain the second sub-key, which induces a fault on the key-dependent permutation layer so, on average, key search space is reduced from 232 to 214, given 36 faulty cipher texts. To obtain the first sub-key, the authors induce a fault on an intermediate results then they obtain, on average, 42 bits of the first sub-key with less than 24 faulty cipher texts. In total, on average, they reduce key search space of PRINTcipher from 280 to 220, given 60 faulty cipher texts. They also simulated their attack on a 1.8 GHz Celeron PC.
  • Keywords
    cryptography; fault tolerant computing; Celeron PC; IC-printing technology; PRINTCIPHER; differential fault analysis; faulty cipher text; integrated circuit; key-dependent permutation layer; lightweight block cipher;
  • fLanguage
    English
  • Journal_Title
    Networks, IET
  • Publisher
    iet
  • ISSN
    2047-4954
  • Type

    jour

  • DOI
    10.1049/iet-net.2012.0117
  • Filename
    6518002