Differential Fault Analysis on SMS4 using a single fault

Differential Fault Analysis on SMS4 using a single fault,10.1016/j.ipl.2010.11.011,Information Processing Letters,Ruilin Li,Bing Sun,Chao Li,Jianxiong

Differential Fault Analysis on SMS4 using a single fault   (Citations: 2)
BibTex | RIS | RefWorks Download
Difierential Fault Analysis (DFA) attack is a powerful crypt- analytic technique that could be used to retrieve the secret key by ex- ploiting computational errors in the encryption (decryption) procedure. In the present paper, we propose a new DFA attack on SMS4 using a single fault. We show that if a random byte fault is induced into either the second, third, or forth word register at the input of the 28-th round, the 128-bit master key could be recovered with an exhaustive search of 22:11 bits on average. The proposed attack makes use of the character- istic of the cipher's structure, the speciality of the difiusion layer, and the difierential property of the S-box. Furthermore, it can be tailored to any block cipher employing a similar structure and an SPN-style round function as that of SMS4.
Journal: Information Processing Letters - IPL , vol. 111, no. 4, pp. 156-163, 2011
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
Sort by: