Title: differential fault analysis on sms4 using a single fault
Author: Li Ruilin
; Sun Bing
; Li Chao
; You Jianxiong
Source: Information Processing Letters
Issued Date: 2011
Volume: 111, Issue: 4, Pages: 156-163 Indexed Type: ei
Department: (1) Department of Mathematics and System Science, Science College, National University of Defense Technology, Changsha 410073, China; (2) State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
English Abstract: Differential Fault Analysis (DFA) attack is a powerful cryptanalytic technique that could be used to retrieve the secret key by exploiting computational errors in the encryption (decryption) procedure. In this paper, we propose a new DFA attack on SMS4 using a single fault. We show that if a random byte fault is induced into either the second, third, or fourth word register at the input of the 28-th round, the 128-bit key could be recovered with an exhaustive search of 22.11 bits on average. The proposed attack makes use of the characteristic of the cipher's structure and its round function. Furthermore, it can be tailored to any block cipher employing a similar structure and an SPN-style round function as that of SMS4. © 2010 Elsevier B.V. All rights reserved.
Language: 英语
WOS ID: WOS:000287057000002
Citation statistics:
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/14045
Appears in Collections: 软件所图书馆_期刊论文
File Name/ File Size
Content Type
Version
Access
License
differential fault analysis on sms4 using a single fault.pdf (328KB) -- -- 限制开放 -- 联系获取全文
Recommended Citation:
Li Ruilin,Sun Bing,Li Chao,et al. differential fault analysis on sms4 using a single fault[J]. Information Processing Letters,2011-01-01,111(4):156-163.