Improving Security of SPN-Type Block Cipher Against Fault Attack

  • Gitika Maity
  • Sunanda Jana
  • Moumita Mantri
  • Jaydeb Bhaumik
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 470)

Abstract

Differential fault attack (DFA) is the most popular technique often used to attack physical implementation of block cipher by introducing a computational error. In this paper, a new modified SPN-type architecture has been proposed which provides better resistance against fault attack compared to AES. The proposed architecture is similar to AES architecture except round key mixing function. A nonlinear vectorial Boolean function called Nmix is used to mix the round key with round output, which is a 16-bit mixing operation. 128-bit 10th round key is retrieved using 24 faulty–fault-free ciphertext pairs by injecting a fault at the input of 9th round, before sub-byte operation. It needs computation complexity of \(2^{53}\) which is much greater compared to original AES to find 128 bit of 10th round key.

Keywords

Fault attack Block cipher Substitution and permutation network Nonlinear Boolean function 

References

  1. 1.
    D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of eliminating errors in cryptographic computations. J. Cryptol. 12, 241–246 (2001)MathSciNetMATHGoogle Scholar
  2. 2.
    D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of checking cryptographic protocols for faults, in EUROCRYPT 1997. LNCS, vol. 1233 (1997), pp. 37–51Google Scholar
  3. 3.
    E. Biham, A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems. CRYPTO 1997, LNCS, vol. 1294 (1997), pp. 513–525Google Scholar
  4. 4.
    J. Daemen, V. Rijmen, The Design of Rijndael (Springer, Heidelberg, 2002)CrossRefMATHGoogle Scholar
  5. 5.
    P. Dusart, G. Letourneux, O. Vivolo, Differential Fault Analysis on A.E.S. (2002). http://eprint.iacr.org/2003/010
  6. 6.
    C. Giraud, DFA on AES,Cryptology ePrint Archive, Report 2003/008Google Scholar
  7. 7.
    J. Blomer, J.P. Seifert, Fault Based Cryptanalysis of the Advanced Encryption Standard (AES), ed. by R.N. Wright. FC 2003, LNCS, vol. 2742 (2003), pp. 162–181Google Scholar
  8. 8.
    G. Piret, J.J. Quisquater, A Differential Fault Attack Technique Against SPN Structures, with Application to the AES and Khazad. CHES 2003, LNCS, vol. 2779 (2003), pp. 77–88Google Scholar
  9. 9.
    S. Das, J. Bhaumik, A fault based attack on MDS-AES. Int. J. Netw. Secur. 16(3), 193–198 (2014)Google Scholar
  10. 10.
    S. Ali, X. Guo, R. Karri, D. Mukhopadhyay, Fault attacks on AES and their countermeasures, in Secure System Design and Trustable Computing, Book Part: Part I (2016), pp. 163–208.  https://doi.org/10.1007/978-3-319-14971-4-5
  11. 11.
    J. Bhaumik, D. Roy Chowdhury, NMIX: an ideal candidate for key mixing, in Proceedings of the International Conference on Security and Cryptography (2009), pp. 285–288Google Scholar
  12. 12.
    D. Mukhopadhyay, An Improved Fault Based Attack of the Advanced Encryption Standard. AFRICACRYPT, LNCS, vol. 5580 (2009), pp. 421–434Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  • Gitika Maity
    • 1
  • Sunanda Jana
    • 1
  • Moumita Mantri
    • 2
  • Jaydeb Bhaumik
    • 3
  1. 1.Department of CSEHaldia Institute of TechnologyHaldiaIndia
  2. 2.Department of ITHaldia Institute of TechnologyHaldiaIndia
  3. 3.Department of ECEHaldia Institute of TechnologyHaldiaIndia

Personalised recommendations