Improved differential fault analysis on PRESENT-80/128

Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong

Research output: Contribution to journalArticle

7 Citations (Scopus)

Abstract

PRESENT is a hardware-optimized 64-bit lightweight block cipher which supports 80- and 128-bit secret keys. In this paper, we propose a differential fault analysis (DFA) on PRESENT-80/128. The proposed attack is based on a 2-byte random fault model. In detail, by inducing several 2-byte random faults in input registers after 28 rounds, our attack recovers the secret key of the target algorithm. From simulation results, our attacks on PRESENT-80/128 can recover the secret key by inducing only two and three 2-byte random faults, respectively. These are superior to known DFA results on them.

Original languageEnglish
Pages (from-to)2553-2563
Number of pages11
JournalInternational Journal of Computer Mathematics
Volume90
Issue number12
DOIs
Publication statusPublished - 2013

Keywords

  • PRESENT
  • block cipher
  • cryptanalysis
  • differential fault analysis
  • random byte fault

ASJC Scopus subject areas

  • Computer Science Applications
  • Computational Theory and Mathematics
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Improved differential fault analysis on PRESENT-80/128'. Together they form a unique fingerprint.

  • Cite this