Abstract
PRESENT is a hardware-optimized 64-bit lightweight block cipher which supports 80- and 128-bit secret keys. In this paper, we propose a differential fault analysis (DFA) on PRESENT-80/128. The proposed attack is based on a 2-byte random fault model. In detail, by inducing several 2-byte random faults in input registers after 28 rounds, our attack recovers the secret key of the target algorithm. From simulation results, our attacks on PRESENT-80/128 can recover the secret key by inducing only two and three 2-byte random faults, respectively. These are superior to known DFA results on them.
Original language | English |
---|---|
Pages (from-to) | 2553-2563 |
Number of pages | 11 |
Journal | International Journal of Computer Mathematics |
Volume | 90 |
Issue number | 12 |
DOIs | |
State | Published - 2013 |
Keywords
- PRESENT
- block cipher
- cryptanalysis
- differential fault analysis
- random byte fault