J4 ›› 2011, Vol. 33 ›› Issue (10): 39-44.
• 论文 • Previous Articles Next Articles
TANG Ming1,2,SHEN Fei2,DENG Hui2,YIN Peng2,QIU Zhenlong2,MA Xiao2,ZHANG Huanguo1,2
Received:
Revised:
Online:
Published:
Abstract:
PRESENT is an ultralightweight block cipher which is suitable for lightweight hardware such as the RFID tags and sensor networks. In this paper, the strength of PRESENT against the differential fault analysis is explored. We present four kinds of fault models of differential fault analysis on PRESENT. Comparing these methods, we come up with the best method to analyse PRESENT using differential fault analysis. Up to now, our method is proved to be more efficient than the existing differential fault analysis on DFA in the published papers. The best result is, by introducing a 8 bit random error between the 28th round permutation and the 29th round permutation, we can recover a 64 bit postwhitening key on an average of 17 fault samples.
Key words: cryptanalysis;differential fault analysis;lightweight cipher;PRESENT
TANG Ming1,2,SHEN Fei2,DENG Hui2,YIN Peng2,QIU Zhenlong2,MA Xiao2,ZHANG. A Multimodel Differential Fault Analysis on PRESENT[J]. J4, 2011, 33(10): 39-44.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2011/V33/I10/39