Skip to main content

Improving Security of SPN-Type Block Cipher Against Fault Attack

  • Conference paper
  • First Online:
Communication, Devices, and Computing (ICCDC 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 470))

Included in the following conference series:

  • 436 Accesses

Abstract

Differential fault attack (DFA) is the most popular technique often used to attack physical implementation of block cipher by introducing a computational error. In this paper, a new modified SPN-type architecture has been proposed which provides better resistance against fault attack compared to AES. The proposed architecture is similar to AES architecture except round key mixing function. A nonlinear vectorial Boolean function called Nmix is used to mix the round key with round output, which is a 16-bit mixing operation. 128-bit 10th round key is retrieved using 24 faulty–fault-free ciphertext pairs by injecting a fault at the input of 9th round, before sub-byte operation. It needs computation complexity of \(2^{53}\) which is much greater compared to original AES to find 128 bit of 10th round key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of eliminating errors in cryptographic computations. J. Cryptol. 12, 241–246 (2001)

    MathSciNet  MATH  Google Scholar 

  2. D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of checking cryptographic protocols for faults, in EUROCRYPT 1997. LNCS, vol. 1233 (1997), pp. 37–51

    Google Scholar 

  3. E. Biham, A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems. CRYPTO 1997, LNCS, vol. 1294 (1997), pp. 513–525

    Google Scholar 

  4. J. Daemen, V. Rijmen, The Design of Rijndael (Springer, Heidelberg, 2002)

    Book  MATH  Google Scholar 

  5. P. Dusart, G. Letourneux, O. Vivolo, Differential Fault Analysis on A.E.S. (2002). http://eprint.iacr.org/2003/010

  6. C. Giraud, DFA on AES,Cryptology ePrint Archive, Report 2003/008

    Google Scholar 

  7. J. Blomer, J.P. Seifert, Fault Based Cryptanalysis of the Advanced Encryption Standard (AES), ed. by R.N. Wright. FC 2003, LNCS, vol. 2742 (2003), pp. 162–181

    Google Scholar 

  8. G. Piret, J.J. Quisquater, A Differential Fault Attack Technique Against SPN Structures, with Application to the AES and Khazad. CHES 2003, LNCS, vol. 2779 (2003), pp. 77–88

    Google Scholar 

  9. S. Das, J. Bhaumik, A fault based attack on MDS-AES. Int. J. Netw. Secur. 16(3), 193–198 (2014)

    Google Scholar 

  10. S. Ali, X. Guo, R. Karri, D. Mukhopadhyay, Fault attacks on AES and their countermeasures, in Secure System Design and Trustable Computing, Book Part: Part I (2016), pp. 163–208. https://doi.org/10.1007/978-3-319-14971-4-5

  11. J. Bhaumik, D. Roy Chowdhury, NMIX: an ideal candidate for key mixing, in Proceedings of the International Conference on Security and Cryptography (2009), pp. 285–288

    Google Scholar 

  12. D. Mukhopadhyay, An Improved Fault Based Attack of the Advanced Encryption Standard. AFRICACRYPT, LNCS, vol. 5580 (2009), pp. 421–434

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gitika Maity .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maity, G., Jana, S., Mantri, M., Bhaumik, J. (2017). Improving Security of SPN-Type Block Cipher Against Fault Attack. In: Bhaumik, J., Chakrabarti, I., De, B.P., Bag, B., Mukherjee, S. (eds) Communication, Devices, and Computing. ICCDC 2017. Lecture Notes in Electrical Engineering, vol 470. Springer, Singapore. https://doi.org/10.1007/978-981-10-8585-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8585-7_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8584-0

  • Online ISBN: 978-981-10-8585-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics