scispace - formally typeset
Book ChapterDOI

Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers

Reads0
Chats0
TLDR
In this article, the authors proposed differential fault analysis of Tiaoxin and AEGIS family of ciphers in a nonce reuse setting and showed that the secret key can be recovered with 384 single bit faults.
Abstract
Tiaoxin and AEGIS are two second round candidates of the ongoing CAESAR competition for authenticated encryption. In 2014, Brice Minaud proposed a distinguisher for AEGIS-256 that can be used to recover bits of a partially known message, encrypted \(2^{188}\) times, regardless of the keys used. Also he reported a correlation between AEGIS-128 ciphertexts at rounds i and \(i + 2\), although the biases would require \(2^{140}\) data to be detected. Apart from that, to the best of our knowledge, there is no known cryptanalysis of AEGIS or Tiaoxin. In this paper we propose differential fault analyses of Tiaoxin and AEGIS family of ciphers in a nonce reuse setting. Analysis shows that the secret key of Tiaoxin can be recovered with 384 single bit faults and the states of AEGIS-128, AEGIS-256 and AEGIS-128L can be recovered respectively with 384, 512 and 512 single bit faults. Considering multi byte fault, the number of required faults and re-keying reduces 128 times.

read more

Citations
More filters
Book ChapterDOI

Preventing Differential Fault Analysis Attack on AEGIS Family of Ciphers

TL;DR: The proposed countermeasures show that the state of the ciphers can not be recovered faster than exhaustive search because it needs \(2^{128}\) time to recover a state of each cipher.
References
More filters
Book ChapterDOI

Differential Fault Analysis of Secret Key Cryptosystems

TL;DR: This work states that this attack is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES).
Book ChapterDOI

Differential fault analysis of the advanced encryption standard using a single fault

TL;DR: In this paper, the AES key can be deduced using a single random byte fault at the input of the eighth round using a two-stage algorithm, with a statistical expectation of reducing the possible key hypotheses to 232 and a mere 28.
Posted Content

Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault.

TL;DR: A differential fault attack that can be applied to the AES using a single fault, which demonstrates that when a single random byte fault is induced at the input of the eighth round, the AES key can be deduced using a two stage algorithm.
Journal Article

Differential fault analysis of secret key cryptosystems

TL;DR: Differential Fault Analysis (DFA) as discussed by the authors is a cryptanalytic attack that can be applied to almost any secret key cryptosystem proposed so far in the open literature.
Book ChapterDOI

An Improved Fault Based Attack of the Advanced Encryption Standard

TL;DR: Simulations show that inducing a single random byte fault at the input of the eighth round of the AES algorithm the block cipher key can be deduced without any brute-force search.
Related Papers (5)