New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA
In this paper, we show a new property for the diffusion switching mechanism (DSM) which was proposed by Shirai and Shibutani in 2006, and propose new differential fault attacks (DFAs) on CLEFIA. The DSM is an effective mechanism to design Feistel ciphers, and Feistel ciphers using the DSM are more secure against the differential and the linear cryptanalysis. By applying the DSM to the generalized Feistel network, Shirai et al. proposed a 128-bit block cipher CLEFIA which was adopted as an ISO standard. Shirai and Shibutani proposed two types DSMs; one is using two matrices and the other is using three matrices. It was considered that the security difference between two types DSMs was quite small. In this paper, we propose a new property for the DSM. Our property can be applied to two types DSMs, in particular, it can be applied to the one using two matrices efficiently. We show a small security advantage of the DSM using three matrices, and our results contribute to the comprehension of the DSM. Moreover we can improve DFAs on CLEFIA by using our property. Existing DFAs can not execute without exploiting several faults induced after the 14-th round, but our new DFAs can execute by exploiting several faults induced after the 12-th round. The position where several faults are induced of new DFAs is improved, and it is two rounds earlier than that of existing works.
KeywordsBlock cipher Feistel cipher CLEFIA Diffusion switching mechanism Cryptanalysis Differential fault attack
Unable to display preview. Download preview PDF.
- 1.The 128-Bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0. Sony Corporation (2007)Google Scholar
- 2.Ali, S.S., Mukhopadhyay, D.: Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis. Cryptology ePrint Archive, Report 2012/286 (2012)Google Scholar
- 3.Ali, S.S., Mukhopadhyay, D.: Improved Differential Fault Analysis of CLEFIA. In: FDTC (2013)Google Scholar
- 7.Kim, C.H.: Efficient Methods for Exploiting Faults Induced at AES Middle Rounds. Cryptology ePrint Archive, Report 2011/349 (2011)Google Scholar
- 18.Takahashi, J., Fukunaga, T.: Improved Differential Fault Analysis on CLEFIA. In: FDTC, pp. 25–34. IEEE Computer Society (2008)Google Scholar
- 21.Jie Zhao, X., Wang, T., Zhe Gao, J.: Multiple Bytes Differential Fault Analysis on CLEFIA. Cryptology ePrint Archive, Report 2010/078 (2010)Google Scholar