Internal differential fault analysis of parallelizable ciphers in the counter-mode View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2019-04

AUTHORS

Dhiman Saha, Dipanwita Roy Chowdhury

ABSTRACT

In Saha and Chowdhury (Cryptographic hardware and embedded systems—CHES 2016—18th international conference, Santa Barbara, CA, USA, August 17–19, 2016, Proceedings, 2016) the concept of fault analysis using internal differentials within a cipher was introduced and used to overcome the nonce barrier of conventional differential fault analysis with a demonstration on authenticated cipher PAEQ. However, the attack had a limitation with regard to the fault model which restricted one of the faults to be injected in the last byte of the counter. This in turn also required the message size to be fixed at 255 complete blocks. In this work, we overcome these limitations by extending the concept in a more general setting. In particular, we look at the concept of Fault-Quartets which is central to these kind of fault-based attacks. We theorize the relation of the fault model with the message size which forms an important aspect as regards the complexity of internal differential fault analysis (IDFA). Our findings reveal that the fault model undertaken while targeting the counter can be relaxed at the expense of an exponentially larger message size. Interestingly, the algorithm for finding a Fault-Quartet still remains linear. This in turns implies that in case of PAEQ the time complexities of the IDFA attack reported remain unaffected. The internal differential fault attack is able to uniquely retrieve the key of three versions of full-round PAEQ of key sizes 64, 80 and 128 bits with complexities of about 216, 216 and 250, respectively. More... »

PAGES

1-15

References to SciGraph publications

  • 2014. Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials in FAST SOFTWARE ENCRYPTION
  • 2016. Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2016
  • 2010. When Clocks Fail: On Critical Paths and Clock Faults in SMART CARD RESEARCH AND ADVANCED APPLICATION
  • 2009. An Improved Fault Based Attack of the Advanced Encryption Standard in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2009
  • 2006-05-17. Differential fault analysis of secret key cryptosystems in ADVANCES IN CRYPTOLOGY — CRYPTO '97
  • 2004. Nonce-Based Symmetric Encryption in FAST SOFTWARE ENCRYPTION
  • 2014. Adjusting Laser Injections for Fully Controlled Faults in CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN
  • 2012. Countermeasures for Symmetric Key Ciphers in FAULT ANALYSIS IN CRYPTOGRAPHY
  • 2002. The Design of Rijndael, AES — The Advanced Encryption Standard in NONE
  • 2014-10-25. EscApe: Diagonal Fault Analysis of APE in CSR UND SOCIAL ENTERPRISE
  • 2017-09. Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ in JOURNAL OF HARDWARE AND SYSTEMS SECURITY
  • 2009. Fault Attacks on RSA Signatures with Partially Unknown Messages in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009
  • 2016. Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ in SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING
  • 2003. A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2003
  • 1999-09. Chinese Remaindering Based Cryptosystems in the Presence of Faults in JOURNAL OF CRYPTOLOGY
  • 2014. PAEQ: Parallelizable Permutation-Based Authenticated Encryption in INFORMATION SECURITY
  • 2006. A Generalized Method of Differential Fault Attack Against AES Cryptosystem in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006
  • 2001-03. On the Importance of Eliminating Errors in Cryptographic Computations in JOURNAL OF CRYPTOLOGY
  • 2016. EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2016
  • 2010. Improved Differential Attacks for ECHO and Grøstl in ADVANCES IN CRYPTOLOGY – CRYPTO 2010
  • 2003. Differential Fault Analysis on A.E.S in ROBOCUP 2005: ROBOT SOCCER WORLD CUP IX
  • 2016. Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ in INFORMATION SECURITY AND PRIVACY
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s13389-017-0179-0

    DOI

    http://dx.doi.org/10.1007/s13389-017-0179-0

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1093055392


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Indian Institute of Technology Kharagpur", 
              "id": "https://www.grid.ac/institutes/grid.429017.9", 
              "name": [
                "Crypto Research Lab, Department of Computer Science and Engineering, IIT, Kharagpur, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Saha", 
            "givenName": "Dhiman", 
            "id": "sg:person.012266711264.41", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012266711264.41"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Indian Institute of Technology Kharagpur", 
              "id": "https://www.grid.ac/institutes/grid.429017.9", 
              "name": [
                "Crypto Research Lab, Department of Computer Science and Engineering, IIT, Kharagpur, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Chowdhury", 
            "givenName": "Dipanwita Roy", 
            "id": "sg:person.016373037503.12", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016373037503.12"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-319-13257-0_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000103183", 
              "https://doi.org/10.1007/978-3-319-13257-0_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-10175-0_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002402799", 
              "https://doi.org/10.1007/978-3-319-10175-0_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-12510-2_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002765209", 
              "https://doi.org/10.1007/978-3-642-12510-2_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-12510-2_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002765209", 
              "https://doi.org/10.1007/978-3-642-12510-2_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-43933-3_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010847963", 
              "https://doi.org/10.1007/978-3-662-43933-3_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014932648", 
              "https://doi.org/10.1007/978-3-642-14623-7_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014932648", 
              "https://doi.org/10.1007/978-3-642-14623-7_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0052259", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017540643", 
              "https://doi.org/10.1007/bfb0052259"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0052259", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017540643", 
              "https://doi.org/10.1007/bfb0052259"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-02384-2_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018847029", 
              "https://doi.org/10.1007/978-3-642-02384-2_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-02384-2_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018847029", 
              "https://doi.org/10.1007/978-3-642-02384-2_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-45203-4_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021663921", 
              "https://doi.org/10.1007/978-3-540-45203-4_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-45203-4_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021663921", 
              "https://doi.org/10.1007/978-3-540-45203-4_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-45203-4_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021663921", 
              "https://doi.org/10.1007/978-3-540-45203-4_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-04138-9_31", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023412682", 
              "https://doi.org/10.1007/978-3-642-04138-9_31"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s001459900055", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024609498", 
              "https://doi.org/10.1007/s001459900055"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-13039-2_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030343753", 
              "https://doi.org/10.1007/978-3-319-13039-2_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-13039-2_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030343753", 
              "https://doi.org/10.1007/978-3-319-13039-2_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-45238-6_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031981991", 
              "https://doi.org/10.1007/978-3-540-45238-6_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-45238-6_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031981991", 
              "https://doi.org/10.1007/978-3-540-45238-6_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-53140-2_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033068555", 
              "https://doi.org/10.1007/978-3-662-53140-2_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-25937-4_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034438246", 
              "https://doi.org/10.1007/978-3-540-25937-4_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-25937-4_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034438246", 
              "https://doi.org/10.1007/978-3-540-25937-4_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s001450010016", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035270859", 
              "https://doi.org/10.1007/s001450010016"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-40367-0_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035703352", 
              "https://doi.org/10.1007/978-3-319-40367-0_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11894063_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040139872", 
              "https://doi.org/10.1007/11894063_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11894063_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040139872", 
              "https://doi.org/10.1007/11894063_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tifs.2016.2518130", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044962884"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-29656-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047003493", 
              "https://doi.org/10.1007/978-3-642-29656-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1052093804", 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-04722-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052093804", 
              "https://doi.org/10.1007/978-3-662-04722-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-04722-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052093804", 
              "https://doi.org/10.1007/978-3-662-04722-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-49445-6_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084904849", 
              "https://doi.org/10.1007/978-3-319-49445-6_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-53887-6_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084908004", 
              "https://doi.org/10.1007/978-3-662-53887-6_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s41635-017-0010-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1090943320", 
              "https://doi.org/10.1007/s41635-017-0010-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s41635-017-0010-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1090943320", 
              "https://doi.org/10.1007/s41635-017-0010-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/fdtc.2011.13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093559742"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/fdtc.2011.12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093619963"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/hst.2014.6855580", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094511471"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2019-04", 
        "datePublishedReg": "2019-04-01", 
        "description": "In Saha and Chowdhury (Cryptographic hardware and embedded systems\u2014CHES 2016\u201418th international conference, Santa Barbara, CA, USA, August 17\u201319, 2016, Proceedings, 2016) the concept of fault analysis using internal differentials within a cipher was introduced and used to overcome the nonce barrier of conventional differential fault analysis with a demonstration on authenticated cipher PAEQ. However, the attack had a limitation with regard to the fault model which restricted one of the faults to be injected in the last byte of the counter. This in turn also required the message size to be fixed at 255 complete blocks. In this work, we overcome these limitations by extending the concept in a more general setting. In particular, we look at the concept of Fault-Quartets which is central to these kind of fault-based attacks. We theorize the relation of the fault model with the message size which forms an important aspect as regards the complexity of internal differential fault analysis (IDFA). Our findings reveal that the fault model undertaken while targeting the counter can be relaxed at the expense of an exponentially larger message size. Interestingly, the algorithm for finding a Fault-Quartet still remains linear. This in turns implies that in case of PAEQ the time complexities of the IDFA attack reported remain unaffected. The internal differential fault attack is able to uniquely retrieve the key of three versions of full-round PAEQ of key sizes 64, 80 and 128 bits with complexities of about 216, 216 and 250, respectively.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s13389-017-0179-0", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1136625", 
            "issn": [
              "2190-8508", 
              "2190-8516"
            ], 
            "name": "Journal of Cryptographic Engineering", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "1", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "9"
          }
        ], 
        "name": "Internal differential fault analysis of parallelizable ciphers in the counter-mode", 
        "pagination": "1-15", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "1f9c852f3d97b4f673b3549dc426642b7976941f5ee2f960d5869fd5b2de337d"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s13389-017-0179-0"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1093055392"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s13389-017-0179-0", 
          "https://app.dimensions.ai/details/publication/pub.1093055392"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-11T14:21", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000372_0000000372/records_117125_00000003.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://link.springer.com/10.1007%2Fs13389-017-0179-0"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s13389-017-0179-0'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s13389-017-0179-0'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s13389-017-0179-0'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s13389-017-0179-0'


     

    This table displays all metadata directly associated to this object as RDF triples.

    170 TRIPLES      21 PREDICATES      54 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s13389-017-0179-0 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author N502f58cc748c4cab81831aaaa4f9b451
    4 schema:citation sg:pub.10.1007/11894063_8
    5 sg:pub.10.1007/978-3-319-10175-0_16
    6 sg:pub.10.1007/978-3-319-13039-2_12
    7 sg:pub.10.1007/978-3-319-13257-0_5
    8 sg:pub.10.1007/978-3-319-40367-0_19
    9 sg:pub.10.1007/978-3-319-49445-6_11
    10 sg:pub.10.1007/978-3-540-25937-4_22
    11 sg:pub.10.1007/978-3-540-45203-4_23
    12 sg:pub.10.1007/978-3-540-45238-6_7
    13 sg:pub.10.1007/978-3-642-02384-2_26
    14 sg:pub.10.1007/978-3-642-04138-9_31
    15 sg:pub.10.1007/978-3-642-12510-2_13
    16 sg:pub.10.1007/978-3-642-14623-7_20
    17 sg:pub.10.1007/978-3-642-29656-7_5
    18 sg:pub.10.1007/978-3-662-04722-4
    19 sg:pub.10.1007/978-3-662-43933-3_12
    20 sg:pub.10.1007/978-3-662-53140-2_28
    21 sg:pub.10.1007/978-3-662-53887-6_14
    22 sg:pub.10.1007/bfb0052259
    23 sg:pub.10.1007/s001450010016
    24 sg:pub.10.1007/s001459900055
    25 sg:pub.10.1007/s41635-017-0010-5
    26 https://app.dimensions.ai/details/publication/pub.1052093804
    27 https://doi.org/10.1109/fdtc.2011.12
    28 https://doi.org/10.1109/fdtc.2011.13
    29 https://doi.org/10.1109/hst.2014.6855580
    30 https://doi.org/10.1109/tifs.2016.2518130
    31 schema:datePublished 2019-04
    32 schema:datePublishedReg 2019-04-01
    33 schema:description In Saha and Chowdhury (Cryptographic hardware and embedded systems—CHES 2016—18th international conference, Santa Barbara, CA, USA, August 17–19, 2016, Proceedings, 2016) the concept of fault analysis using internal differentials within a cipher was introduced and used to overcome the nonce barrier of conventional differential fault analysis with a demonstration on authenticated cipher PAEQ. However, the attack had a limitation with regard to the fault model which restricted one of the faults to be injected in the last byte of the counter. This in turn also required the message size to be fixed at 255 complete blocks. In this work, we overcome these limitations by extending the concept in a more general setting. In particular, we look at the concept of Fault-Quartets which is central to these kind of fault-based attacks. We theorize the relation of the fault model with the message size which forms an important aspect as regards the complexity of internal differential fault analysis (IDFA). Our findings reveal that the fault model undertaken while targeting the counter can be relaxed at the expense of an exponentially larger message size. Interestingly, the algorithm for finding a Fault-Quartet still remains linear. This in turns implies that in case of PAEQ the time complexities of the IDFA attack reported remain unaffected. The internal differential fault attack is able to uniquely retrieve the key of three versions of full-round PAEQ of key sizes 64, 80 and 128 bits with complexities of about 216, 216 and 250, respectively.
    34 schema:genre research_article
    35 schema:inLanguage en
    36 schema:isAccessibleForFree false
    37 schema:isPartOf N226e0303c5434f0ab68532e556642588
    38 N61b313d915c0437aace4e3e186f04d46
    39 sg:journal.1136625
    40 schema:name Internal differential fault analysis of parallelizable ciphers in the counter-mode
    41 schema:pagination 1-15
    42 schema:productId N118ee31a2ffd4ca48b5ea679cf2015ce
    43 N1ad3ac0888c64ccabace238db4837f42
    44 Naed036d094e946b49528bd75a7baacad
    45 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093055392
    46 https://doi.org/10.1007/s13389-017-0179-0
    47 schema:sdDatePublished 2019-04-11T14:21
    48 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    49 schema:sdPublisher Nbf56f0942826463db788f1a745a559c5
    50 schema:url https://link.springer.com/10.1007%2Fs13389-017-0179-0
    51 sgo:license sg:explorer/license/
    52 sgo:sdDataset articles
    53 rdf:type schema:ScholarlyArticle
    54 N118ee31a2ffd4ca48b5ea679cf2015ce schema:name readcube_id
    55 schema:value 1f9c852f3d97b4f673b3549dc426642b7976941f5ee2f960d5869fd5b2de337d
    56 rdf:type schema:PropertyValue
    57 N1ad3ac0888c64ccabace238db4837f42 schema:name doi
    58 schema:value 10.1007/s13389-017-0179-0
    59 rdf:type schema:PropertyValue
    60 N226e0303c5434f0ab68532e556642588 schema:volumeNumber 9
    61 rdf:type schema:PublicationVolume
    62 N502f58cc748c4cab81831aaaa4f9b451 rdf:first sg:person.012266711264.41
    63 rdf:rest Ndd810be9e1534c91b4e50c8b7ef1c9d8
    64 N61b313d915c0437aace4e3e186f04d46 schema:issueNumber 1
    65 rdf:type schema:PublicationIssue
    66 Naed036d094e946b49528bd75a7baacad schema:name dimensions_id
    67 schema:value pub.1093055392
    68 rdf:type schema:PropertyValue
    69 Nbf56f0942826463db788f1a745a559c5 schema:name Springer Nature - SN SciGraph project
    70 rdf:type schema:Organization
    71 Ndd810be9e1534c91b4e50c8b7ef1c9d8 rdf:first sg:person.016373037503.12
    72 rdf:rest rdf:nil
    73 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    74 schema:name Information and Computing Sciences
    75 rdf:type schema:DefinedTerm
    76 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    77 schema:name Computer Software
    78 rdf:type schema:DefinedTerm
    79 sg:journal.1136625 schema:issn 2190-8508
    80 2190-8516
    81 schema:name Journal of Cryptographic Engineering
    82 rdf:type schema:Periodical
    83 sg:person.012266711264.41 schema:affiliation https://www.grid.ac/institutes/grid.429017.9
    84 schema:familyName Saha
    85 schema:givenName Dhiman
    86 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012266711264.41
    87 rdf:type schema:Person
    88 sg:person.016373037503.12 schema:affiliation https://www.grid.ac/institutes/grid.429017.9
    89 schema:familyName Chowdhury
    90 schema:givenName Dipanwita Roy
    91 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016373037503.12
    92 rdf:type schema:Person
    93 sg:pub.10.1007/11894063_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040139872
    94 https://doi.org/10.1007/11894063_8
    95 rdf:type schema:CreativeWork
    96 sg:pub.10.1007/978-3-319-10175-0_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002402799
    97 https://doi.org/10.1007/978-3-319-10175-0_16
    98 rdf:type schema:CreativeWork
    99 sg:pub.10.1007/978-3-319-13039-2_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030343753
    100 https://doi.org/10.1007/978-3-319-13039-2_12
    101 rdf:type schema:CreativeWork
    102 sg:pub.10.1007/978-3-319-13257-0_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000103183
    103 https://doi.org/10.1007/978-3-319-13257-0_5
    104 rdf:type schema:CreativeWork
    105 sg:pub.10.1007/978-3-319-40367-0_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035703352
    106 https://doi.org/10.1007/978-3-319-40367-0_19
    107 rdf:type schema:CreativeWork
    108 sg:pub.10.1007/978-3-319-49445-6_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084904849
    109 https://doi.org/10.1007/978-3-319-49445-6_11
    110 rdf:type schema:CreativeWork
    111 sg:pub.10.1007/978-3-540-25937-4_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034438246
    112 https://doi.org/10.1007/978-3-540-25937-4_22
    113 rdf:type schema:CreativeWork
    114 sg:pub.10.1007/978-3-540-45203-4_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021663921
    115 https://doi.org/10.1007/978-3-540-45203-4_23
    116 rdf:type schema:CreativeWork
    117 sg:pub.10.1007/978-3-540-45238-6_7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031981991
    118 https://doi.org/10.1007/978-3-540-45238-6_7
    119 rdf:type schema:CreativeWork
    120 sg:pub.10.1007/978-3-642-02384-2_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018847029
    121 https://doi.org/10.1007/978-3-642-02384-2_26
    122 rdf:type schema:CreativeWork
    123 sg:pub.10.1007/978-3-642-04138-9_31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023412682
    124 https://doi.org/10.1007/978-3-642-04138-9_31
    125 rdf:type schema:CreativeWork
    126 sg:pub.10.1007/978-3-642-12510-2_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002765209
    127 https://doi.org/10.1007/978-3-642-12510-2_13
    128 rdf:type schema:CreativeWork
    129 sg:pub.10.1007/978-3-642-14623-7_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014932648
    130 https://doi.org/10.1007/978-3-642-14623-7_20
    131 rdf:type schema:CreativeWork
    132 sg:pub.10.1007/978-3-642-29656-7_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047003493
    133 https://doi.org/10.1007/978-3-642-29656-7_5
    134 rdf:type schema:CreativeWork
    135 sg:pub.10.1007/978-3-662-04722-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052093804
    136 https://doi.org/10.1007/978-3-662-04722-4
    137 rdf:type schema:CreativeWork
    138 sg:pub.10.1007/978-3-662-43933-3_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010847963
    139 https://doi.org/10.1007/978-3-662-43933-3_12
    140 rdf:type schema:CreativeWork
    141 sg:pub.10.1007/978-3-662-53140-2_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033068555
    142 https://doi.org/10.1007/978-3-662-53140-2_28
    143 rdf:type schema:CreativeWork
    144 sg:pub.10.1007/978-3-662-53887-6_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084908004
    145 https://doi.org/10.1007/978-3-662-53887-6_14
    146 rdf:type schema:CreativeWork
    147 sg:pub.10.1007/bfb0052259 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017540643
    148 https://doi.org/10.1007/bfb0052259
    149 rdf:type schema:CreativeWork
    150 sg:pub.10.1007/s001450010016 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035270859
    151 https://doi.org/10.1007/s001450010016
    152 rdf:type schema:CreativeWork
    153 sg:pub.10.1007/s001459900055 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024609498
    154 https://doi.org/10.1007/s001459900055
    155 rdf:type schema:CreativeWork
    156 sg:pub.10.1007/s41635-017-0010-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090943320
    157 https://doi.org/10.1007/s41635-017-0010-5
    158 rdf:type schema:CreativeWork
    159 https://app.dimensions.ai/details/publication/pub.1052093804 schema:CreativeWork
    160 https://doi.org/10.1109/fdtc.2011.12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093619963
    161 rdf:type schema:CreativeWork
    162 https://doi.org/10.1109/fdtc.2011.13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093559742
    163 rdf:type schema:CreativeWork
    164 https://doi.org/10.1109/hst.2014.6855580 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094511471
    165 rdf:type schema:CreativeWork
    166 https://doi.org/10.1109/tifs.2016.2518130 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044962884
    167 rdf:type schema:CreativeWork
    168 https://www.grid.ac/institutes/grid.429017.9 schema:alternateName Indian Institute of Technology Kharagpur
    169 schema:name Crypto Research Lab, Department of Computer Science and Engineering, IIT, Kharagpur, India
    170 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...