Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/13631
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Joshi, Priyanka | en_US |
dc.contributor.author | Mazumdar, Bodhisatwa | en_US |
dc.date.accessioned | 2024-04-26T12:43:32Z | - |
dc.date.available | 2024-04-26T12:43:32Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | Joshi, P., & Mazumdar, B. (2024). Deep round key recovery attacks and countermeasure in persistent fault model: A case study on GIFT and KLEIN. Journal of Cryptographic Engineering. Scopus. https://doi.org/10.1007/s13389-024-00349-1 | en_US |
dc.identifier.issn | 2190-8508 | - |
dc.identifier.other | EID(2-s2.0-85188190924) | - |
dc.identifier.uri | https://doi.org/10.1007/s13389-024-00349-1 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/13631 | - |
dc.description.abstract | Persistent fault analysis (PFA) has emerged as a powerful technique that can recover the secret key by influencing ciphertext distribution. Most research work highlights its application for investigating the last round key. This work presents PFA attack methods to recover deeper round keys of SPN ciphers, wherein the last round key alone can not determine the entire master key. We use GIFT and KLEIN ciphers to validate our methods and show the effectiveness of the proposed approach through simulation. We could recover the full master keys of both the GIFT cipher versions by retrieving the round keys up to the depth 2 and 4 for GIFT-128 and GIFT-64, respectively. Our method recovered KLEIN�s last round key and penultimate round key in average 75 and 180 ciphertexts, respectively. We also analyzed the success rate of our approach for varying depths and Hamming distances. In GIFT-64, for Hamming distance 1, keys were recovered in approximately 110, 290, and 750 ciphertexts for round numbers 28, 27, and 26, respectively, with a 100% success rate. For round 25, around 2000 ciphertexts were sufficient to recover the round key in 90% of the cases out of 1000 experiments. For 39th round of GIFT-128, the round key can be recovered with a 100% success rate in roughly 380, 575, and 1100 ciphertexts for the Hamming distance 1, 2, and 3, respectively. However, for the same round with Hamming distance of value 4, the success rate is 75% for around 2000 ciphertexts. In addition, we propose a countermeasure to thwart PFA attacks and Intermediate-oriented fault attacks, such as, differential fault analysis. � The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2024. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
dc.source | Journal of Cryptographic Engineering | en_US |
dc.subject | Countermeasure | en_US |
dc.subject | Fault attacks | en_US |
dc.subject | GIFT | en_US |
dc.subject | KLEIN | en_US |
dc.subject | Lightweight encryption | en_US |
dc.subject | Persistent fault analysis | en_US |
dc.title | Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: