Advertisement

Differential Fault Attacks on KLEIN

  • Michael GruberEmail author
  • Bodo Selmke
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11421)

Abstract

This paper proposes two Differential Fault Attacks on the lightweight block cipher KLEIN. Variant one targets the intermediate state of the cipher. Using at least five faulty ciphertexts, the attacker is able to determine the last round key. The second variant, which works only on KLEIN-64, injects a byte-fault in the key schedule and requires at least four faulty ciphertexts in order to determine the whole key. Furthermore, we demonstrate the efficiency of both attack methods by simulation.

Keywords

Differential fault analysis Fault attack Key schedule Lightweight block cipher KLEIN 

Notes

Acknowledgments

We would like to thank the anonymous reviewers for their valuable comments and suggestions on the paper, as these helped us to improve it. This work was partly funded by the German Federal Ministry of Education and Research in the project HQS through grant number 16KIS0616.

References

  1. 1.
    Ali, S.S., Mukhopadhyay, D.: Differential fault analysis of AES-128 key schedule using a single multi-byte fault. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 50–64. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-27257-8_4CrossRefGoogle Scholar
  2. 2.
    Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-74735-2_31CrossRefGoogle Scholar
  3. 3.
    Chen, C.-N., Yen, S.-M.: Differential fault analysis on AES key schedule and some countermeasures. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 118–129. Springer, Heidelberg (2003).  https://doi.org/10.1007/3-540-45067-X_11CrossRefGoogle Scholar
  4. 4.
    Cunyang, F., Yuechuan, W., Xiaozhong, P.: A differential fault analysis method for KLEIN cipher. Comput. Appl. Softw. 32, 6 (2015)Google Scholar
  5. 5.
    Dunkelman, O., Keller, N.: The effects of the omission of last round’s mixcolumns on AES. Cryptology ePrint Archive, Report 2010/041 (2010). https://eprint.iacr.org/2010/041
  6. 6.
    Gong, Z., Nikova, S., Law, Y.W.: KLEIN: a new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 1–18. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-25286-0_1CrossRefGoogle Scholar
  7. 7.
    Guillen, O.M., Gruber, M., De Santis, F.: Low-cost setup for localized semi-invasive optical fault injection attacks. In: Guilley, S. (ed.) COSADE 2017. LNCS, vol. 10348, pp. 207–222. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-64647-3_13CrossRefGoogle Scholar
  8. 8.
    Kim, C.H.: Improved differential fault analysis on AES key schedule. IEEE Trans. Inf. Forensics Secur. 7(1), 41–50 (2012)CrossRefGoogle Scholar
  9. 9.
    Mukhopadhyay, D.: An improved fault based attack of the advanced encryption standard. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 421–434. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-02384-2_26CrossRefGoogle Scholar
  10. 10.
    Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003).  https://doi.org/10.1007/978-3-540-45238-6_7CrossRefzbMATHGoogle Scholar
  11. 11.
    NIST FIPS Pub. 197: Advanced encryption standard (AES). Federal Information Processing Standards Publication 197(441):0311 (2001)Google Scholar
  12. 12.
    Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential fault analysis of the advanced encryption standard using a single fault. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 224–233. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-21040-2_15CrossRefGoogle Scholar
  13. 13.
    Wang, Y.-J., Ren, Q.-Y., Zhang, S.-Y.: Differential fault attack on lightweight block cipher KLEIN. Tongxin Xuebao/J. Commun. 37, 111–115 (2016). 10Google Scholar
  14. 14.
    Yoshikawa, H., Kaminaga, M., Shikoda, A., Suzuki, T.: Round addition DFA on lightweight block ciphers with on-the-fly key scheduling. Int. J. Math. Comput. Sci. 9(9), 1 (2006)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Chair of Security in Information TechnologyTechnical University of MunichMunichGermany
  2. 2.Fraunhofer Institute for Applied and Integrated SecurityGarchingGermany

Personalised recommendations