Improved differential fault analysis on PRESENT-80/128
- Authors
- Jeong, Kitae; Lee, Yuseop; Sung, Jaechul; Hong, Seokhie
- Issue Date
- 1-12월-2013
- Publisher
- TAYLOR & FRANCIS LTD
- Keywords
- PRESENT; differential fault analysis; block cipher; cryptanalysis; random byte fault; 94A60; 11T71; 14G50
- Citation
- INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, v.90, no.12, pp.2553 - 2563
- Indexed
- SCIE
SCOPUS
- Journal Title
- INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS
- Volume
- 90
- Number
- 12
- Start Page
- 2553
- End Page
- 2563
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/101335
- DOI
- 10.1080/00207160.2012.760732
- ISSN
- 0020-7160
- Abstract
- PRESENT is a hardware-optimized 64-bit lightweight block cipher which supports 80- and 128-bit secret keys. In this paper, we propose a differential fault analysis (DFA) on PRESENT-80/128. The proposed attack is based on a 2-byte random fault model. In detail, by inducing several 2-byte random faults in input registers after 28 rounds, our attack recovers the secret key of the target algorithm. From simulation results, our attacks on PRESENT-80/128 can recover the secret key by inducing only two and three 2-byte random faults, respectively. These are superior to known DFA results on them.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.