首页 | 本学科首页   官方微博 | 高级检索  
     


Improved differential fault analysis on PRESENT-80/128
Authors:Kitae Jeong  Yuseop Lee  Seokhie Hong
Affiliation:Center for Information Security Technologies(CIST), Korea University, Seoul, South Korea
Abstract:PRESENT is a hardware-optimized 64-bit lightweight block cipher which supports 80- and 128-bit secret keys. In this paper, we propose a differential fault analysis (DFA) on PRESENT-80/128. The proposed attack is based on a 2-byte random fault model. In detail, by inducing several 2-byte random faults in input registers after 28 rounds, our attack recovers the secret key of the target algorithm. From simulation results, our attacks on PRESENT-80/128 can recover the secret key by inducing only two and three 2-byte random faults, respectively. These are superior to known DFA results on them.
Keywords:PRESENT  differential fault analysis  block cipher  cryptanalysis  random byte fault
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号