Abstract
In 2012, several Differential Fault Analyses on the AES cipher were analyzed from an information-theoretic perspective. This analysis exposed whether or not the leaked information was fully exploited. We apply the same approach to all existing Differential Fault Analyses on the CLEFIA cipher. We show that only some of these attacks are already optimal. We improve those analyses which did not exploit all information. With one exception, all attacks against CLEFIA-128 reach the theoretical limit after our improvement. Our improvement of an attack against CLEFIA-192 and CLEFIA-256 reduces the number of fault injections to the lowest possible number reached so far.
This work has been co-funded by the DFG as part of projects P1 and E3 within the CRC 1119 CROSSING and by the European Union’s Seventh Framework Program (FP7/2007-2013) under grant agreement n. 609611 (PRACTICE). The authors would like to thank TU Berlin, especially the Chair for Security in Telecommunications and Jean-Pierre Seifert, for valuable support.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
All figures in this section are taken from [13].
References
Ali, S., Mukhopadhyay, D.: Protecting last four rounds of CLEFIA is not enough against differential fault analysis. IACR Cryptology ePrint Archive, p. 286 (2012)
Ali, S., Mukhopadhyay, D.: Improved differential fault analysis of CLEFIA. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2013), pp. 60–70. IEEE (2013)
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)
Chen, H., Wu, W., Feng, D.: Differential fault analysis on CLEFIA. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 284–295. Springer, Heidelberg (2007)
Feller, W.: An Introduction to Probability Theory and Its Applications, vol. 1. Wiley, New York (1968)
Fischer, W., Reuter, C.A.: Differential fault analysis on Grøstl. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2012), pp. 44–54. IEEE (2012)
Karmakar, S., Chowdhury, D.R.: Differential fault analysis of MICKEY-128 2.0. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2013), pp. 52–59. IEEE (2013)
Krämer, J., Stüber, A., Kiss, Á.: On the optimality of differential fault analyses on CLEFIA. IACR Cryptology ePrint Archive 2014, p. 572 (2014)
Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003)
Rebeiro, C., Poddar, R., Datta, A., Mukhopadhyay, D.: An enhanced differential cache attack on CLEFIA for large cache Lines. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol. 7107, pp. 58–75. Springer, Heidelberg (2011)
Sakiyama, K., Li, Y., Iwamoto, M., Ohta, K.: Information-theoretic approach to optimal differential fault analysis. IEEE Trans. Inf. Forensics Secur. 7, 109–120 (2012)
Shannon, C.: A mathematical theory of communication. Bell Syst. Tech. J. 27(379–423), 623–656 (1948)
Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (Extended Abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181–195. Springer, Heidelberg (2007)
Takahashi, J., Fukunaga, T.: Improved differential fault analysis on CLEFIA. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2008), pp. 25–34. IEEE (2008)
Takahashi, J., Fukunaga, T.: Differential fault analysis on CLEFIA with 128, 192, and 256-bit keys. IEICE Trans. 93–A, 136–143 (2010)
Tezcan, C.: The improbable differential attack: cryptanalysis of reduced round CLEFIA. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 197–209. Springer, Heidelberg (2010)
Tsunoo, Y., Tsujihara, E., Shigeri, M., Saito, T., Suzaki, T., Kubo, H.: Impossible differential cryptanalysis of CLEFIA. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 398–411. Springer, Heidelberg (2008)
Zhao, X., Wang, T., Gao, J.: Multiple bytes differential fault analysis on CLEFIA. IACR Cryptology ePrint Archive, p. 78 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Kiss, Á., Krämer, J., Stüber, A. (2016). On the Optimality of Differential Fault Analyses on CLEFIA. In: Kotsireas, I., Rump, S., Yap, C. (eds) Mathematical Aspects of Computer and Information Sciences. MACIS 2015. Lecture Notes in Computer Science(), vol 9582. Springer, Cham. https://doi.org/10.1007/978-3-319-32859-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-32859-1_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32858-4
Online ISBN: 978-3-319-32859-1
eBook Packages: Computer ScienceComputer Science (R0)