GAO Si, CHEN Hua, FAN Limin, et al., “Improved Fault Attack on LBlock: Earlier Injection with No Extra Faults,” Chinese Journal of Electronics, vol. 26, no. 4, pp. 754-759, 2017, doi: 10.1049/cje.2017.04.007
Citation: GAO Si, CHEN Hua, FAN Limin, et al., “Improved Fault Attack on LBlock: Earlier Injection with No Extra Faults,” Chinese Journal of Electronics, vol. 26, no. 4, pp. 754-759, 2017, doi: 10.1049/cje.2017.04.007

Improved Fault Attack on LBlock: Earlier Injection with No Extra Faults

doi: 10.1049/cje.2017.04.007
Funds:  This work is supported by the National Basic Research Program of China (973 Program) (No.2013CB338002).
  • Received Date: 2015-01-13
  • Rev Recd Date: 2015-07-11
  • Publish Date: 2017-07-10
  • As one of the most popular lightweight ciphers in recent years, LBlock has attracted great attention. Researchers have explored the security of LBlock against various attacks. We focus on fault attack—one of the most important implementation attacks. In the past two years, fault attacks under the random fault model have been successfully applied to LBlock, supposing faults were injected at the end of the 24th to the 31st round. If faults are injected at the end of the 23rd round, previous attacks only work under the semi-random fault model. For the first time, we address this issue and propose a 23rd round fault attack under the random fault model. Compared with the previous works, our attack extends the fault injection to earlier round, with reasonable time cost and no extra faults. Experiments show that it only takes 10 faults to recover the secret key.
  • loading
  • W.L. Wu and L. Zhang, “LBlock: A lightweight block cipher”, Applied Cryptography and Network Security, Lecture Notes in Computer Science (LNCS), Vol.6715, pp.327-344, 2011.
    L. Wen, M.Q. Wang and J.Y. Zhao, “Related-key impossible differential attack on reduced-round LBlock”, Journal of Computer Science and Technology, Vol.29, No.1, pp.165-176, 2014.
    Y. Liu, D.W. Gu, Z.Q. Liu, et al., “Impossible differential attacks on reduced-round LBlock”, 8th International Conference on Information Security Practice and Experience, ISPEC 2012, Hangzhou, China, LNCS, Vol.7232, pp.97-108, 2012.
    S. Emami, C. McDonald, J. Pieprzyk, et al., “Truncated differential analysis of reduced-round LBlock”, 12th International Conference on Cryptology and Network Security, CANS 2013, Paraty, Brazil, LNCS, Vol.8257, pp.291-308, 2013.
    F. Karakoc, H. Demirci and A.E. Harmanci, “Biclique cryptanalysis of LBlock and TWINE”, Information Processing Letters, Vol.113, No.12, pp.423-429, 2013.
    Y. Sasaki and L. Wang, “Comprehensive study of integral analysis on 22-round LBlock”, 15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Republic of Korea, LNCS, Vol.7839, pp.156-169, 2013.
    S.W. Sun, L. Hu, P. Wang, et al., “Automatic security evaluation and (related-key) differential characteristic search: Application to SIMON, PRESENT, LBlock, DES(L) and other bitoriented block ciphers”, Advances in Cryptology—ASIACRYPT 2014, LNCS, Vol.8873, pp.158-178, 2014.
    Y.Z. Wei, C.M. Su and C.B. Ma, “A meet-in-the-middle attack on the LBlock cipher”, Conference Anthology, IEEE, Guangxi, China, pp.1-3, 2013.
    Z.Q. Li, B. Zhang, Y. Yao, et al., “Cube cryptanalysis of LBlock with noisy leakage”, 15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, LNCS, Vol.7839, pp.141-155, 2012.
    C.Y. Peng, C.Y. Zhu, L. Huang, et al., “Extended algebraicside channel attack and its application”, Chinese Journal of Electronics, Vol.41, No.5, pp.859-864, 2013.
    D. Boneh, R. DeMillo and R. Lipton, “On the importance of checking cryptographic protocols for faults”, Advances in Cryptology EUROCRYPT97, LNCS, Vol.1233, pp.37-51, 1997.
    E. Biham and A. Shamir, “Differential fault analysis of secret key cryptosystems”, Advances in Cryptology—CRYPTO 97, LNCS, Vol.1294, pp.513-525, 1997.
    L. Hemme, “A differential fault attack against early rounds of (triple-)DES”, Cryptographic Hardware and Embedded Systems—CHES 2004, LNCS, Vol.3156, pp.254-267, 2004.
    P. Dusart, G. Letourneux and O. Vivolo, “Differential fault analysis on A.E.S”, Applied Cryptography and Network Security, LNCS, Vol.2846, pp.293-306, 2003.
    C. Giraud, “DFA on AES”. Advanced Encryption Standard—AES, LNCS, Vol.3373, pp.27-41, 2005.
    P. Derbez, P.A. Fouque and D. Leresteux, “Meet-in-the-middle and impossible differential fault analysis on AES”, Cryptographic Hardware and Embedded Systems—CHES 2011, LNCS, Vol.6917, pp.274-291, 2011.
    H. Chen, W.L. Wu and D. Feng, “Differential Fault Analysis on CLEFIA”, Information and Communications Security, LNCS, Vol.4861, pp.284-295, 2007.
    J. Takahashi and T. Fukunaga, “Improved differential fault analysis on CLEFIA”, 5th International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2008, Washington, DC, United States, pp.25-34, 2008.
    Y.B. Zhou, W.L. Wu, N.N. Xu, et al., “Differential fault attack on camellia”. Chinese Journal of Electronics, Vol.18, No.1, pp.13-19, 2009.
    L. Zhao, T. Nishide and K. Sakurai, “Differential fault analysis of full LBlock”, Constructive Side-Channel Analysis and Secure Design, LNCS, Vol.7275, pp.135-150, 2012.
    H. Chen and L. Fan, “Integral based fault attack on LBlock”,16th Annual International Conference on Information Security and Cryptology, Seoul, Korea, pp.227-240, 2013.
    F. Zhang, X.J. Zhao, S.Z. Guo, et al., “Improving fault analysis on LBlock with algebraic technique”, Chinese Association for Cryptologic Research 2013 Annual Conference, Fu Zhou, China, pp. 172-187, 2014. (in Chinese).
    K. Jeong, C. Lee and J. Lim, “Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks”, EURASIP Journal on Wireless Communications and Networking, Vol.2013, No.1, pp.1-9, 2013.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (403) PDF downloads(384) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return