Abstract
Improved algebraic attack and differential fault attack on the KATAN block cipher are presented. In the SAT-based algebraic analysis, we improve the ANF-to-CNF conversion to make good use of short equations in the algebraic representation of the cipher. An optimal number of plaintext/ciphertext pairs with a certain structure are used, and 84, 70, and 65 rounds of KATAN32, KATAN48, and KATAN64 are broken, respectively, which are 5 more rounds of the cipher than previous works under the same attack scenario. In the differential fault attack, a new method of recovering secret key bits from faulty and fault-free ciphertexts is developed under one-bit and two-bit fault models, and its iteration application can retrieve the whole 80-bit secret key of the full-round KATAN32, KATAN48, and KATAN64 with 132, 44, and 52 fault injections under the one-bit fault model and with 140, 60, and 60 fault injections under the two-bit fault model, respectively. The time complexity of the attack is negligible, which is a great improvement on previous differential fault attacks on KATAN of time complexity 259,255, and 255 and with 115, 211, and 278 fault injections, respectively, under the one-bit fault model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abdul-Latip, S.F., Reyhanitabar, M.R., Susilo, W., Seberry, J.: Fault analysis of the KATAN family of block ciphers. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 319–336. Springer, Heidelberg (2012)
Albrecht, M., Leander, G.: An All-in-One Approach to Differential Cryptanalysis for Small Block Ciphers. In: IACR Cryptology ePrint Archive, number 401 (2012)
Albrecht, M., Soos, M.: ANF2CNF - Converting ANF to CNF for Algebraic Attack Using SAT Solver (2010), http://gforge.inria.fr/frs/?group_id=2330&release_id=5449
Bard, G., Courtois, N., Jefferson, C.: Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomial over GF(2) via SAT-Solvers. In: IACR Cryptology ePrint Archive, number 024 (2007)
Bard, G.V., Courtois, N.T., Nakahara Jr, J., Sepehrdad, P., Zhang, B.: Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 176–196. Springer, Heidelberg (2010)
Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key cryptosystem. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)
Bulygin, S., Buchmann, J.: Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48. In: Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011. LNCS, vol. 7092, pp. 54–75. Springer, Heidelberg (2011)
Courtois, N.T., Bard, G.V., Wagner, D.: Algebraic and slide attacks on keeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 97–115. Springer, Heidelberg (2008)
De Cannière, C.: Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171–186. Springer, Heidelberg (2006)
De Cannière, C., Dunkelman, O., Knežević, M.: KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272–288. Springer, Heidelberg (2009)
Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009)
Een, N., Sorensson, N.: MiniSat v1.13 - A SAT Solver with Conflict-Clause Minimization (2005), http://www.minisatse.com/Papers.html
Homsirikamol, E., Morawiecki, P., Rogawski, M., Srebrny, M.: Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks. In: IACR Cryptology ePrint Archive, number 421 (2012)
Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional Differential Cryptanalysis of NLFSE-Based Cryptosystems. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 130–145. Springer, Heidelberg (2010)
McDonald, C., Charnes, C., Pieprzyk, J.: Attacking bivium with Minisat. In: IACR Cryptology ePrint Archive, number 040 (2007)
Mohamed, M.S.E., Bulygin, S., Buchmann, J.: Using SAT Solving to Improve Differential Fault Analysis of Trivium. In: Kim, T.-h., Adeli, H., Robles, R.J., Balitanas, M. (eds.) ISA 2011. CCIS, vol. 200, pp. 62–71. Springer, Heidelberg (2011)
Soos, M.: Grain of Salt - an automated way to test stream ciphers through SAT solver, http://www.msoos.org/grain-of-salt
Soos, M., Nohl, K., Castelluccia, C.: Extending SAT Solvers to Crytpographic Problems. In: Kullmann, O. (ed.) SAT 2009. LNCS, vol. 5584, pp. 244–257. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Song, L., Hu, L. (2013). Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher. In: Deng, R.H., Feng, T. (eds) Information Security Practice and Experience. ISPEC 2013. Lecture Notes in Computer Science, vol 7863. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38033-4_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-38033-4_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38032-7
Online ISBN: 978-3-642-38033-4
eBook Packages: Computer ScienceComputer Science (R0)