Improved differential fault analysis on PRESENT-80/128 |
| |
Authors: | Kitae Jeong Yuseop Lee Seokhie Hong |
| |
Affiliation: | Center for Information Security Technologies(CIST), Korea University, Seoul, South Korea |
| |
Abstract: | PRESENT is a hardware-optimized 64-bit lightweight block cipher which supports 80- and 128-bit secret keys. In this paper, we propose a differential fault analysis (DFA) on PRESENT-80/128. The proposed attack is based on a 2-byte random fault model. In detail, by inducing several 2-byte random faults in input registers after 28 rounds, our attack recovers the secret key of the target algorithm. From simulation results, our attacks on PRESENT-80/128 can recover the secret key by inducing only two and three 2-byte random faults, respectively. These are superior to known DFA results on them. |
| |
Keywords: | PRESENT differential fault analysis block cipher cryptanalysis random byte fault |
|
|