Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Improved differential fault analysis on PRESENT-80/128

Authors
Jeong, KitaeLee, YuseopSung, JaechulHong, Seokhie
Issue Date
1-12월-2013
Publisher
TAYLOR & FRANCIS LTD
Keywords
PRESENT; differential fault analysis; block cipher; cryptanalysis; random byte fault; 94A60; 11T71; 14G50
Citation
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, v.90, no.12, pp.2553 - 2563
Indexed
SCIE
SCOPUS
Journal Title
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS
Volume
90
Number
12
Start Page
2553
End Page
2563
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/101335
DOI
10.1080/00207160.2012.760732
ISSN
0020-7160
Abstract
PRESENT is a hardware-optimized 64-bit lightweight block cipher which supports 80- and 128-bit secret keys. In this paper, we propose a differential fault analysis (DFA) on PRESENT-80/128. The proposed attack is based on a 2-byte random fault model. In detail, by inducing several 2-byte random faults in input registers after 28 rounds, our attack recovers the secret key of the target algorithm. From simulation results, our attacks on PRESENT-80/128 can recover the secret key by inducing only two and three 2-byte random faults, respectively. These are superior to known DFA results on them.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE