Improved differential fault analysis on PRESENT-80/128

Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong

Research output: Contribution to journalArticlepeer-review

19 Scopus citations

Abstract

PRESENT is a hardware-optimized 64-bit lightweight block cipher which supports 80- and 128-bit secret keys. In this paper, we propose a differential fault analysis (DFA) on PRESENT-80/128. The proposed attack is based on a 2-byte random fault model. In detail, by inducing several 2-byte random faults in input registers after 28 rounds, our attack recovers the secret key of the target algorithm. From simulation results, our attacks on PRESENT-80/128 can recover the secret key by inducing only two and three 2-byte random faults, respectively. These are superior to known DFA results on them.

Original languageEnglish
Pages (from-to)2553-2563
Number of pages11
JournalInternational Journal of Computer Mathematics
Volume90
Issue number12
DOIs
StatePublished - 2013

Keywords

  • PRESENT
  • block cipher
  • cryptanalysis
  • differential fault analysis
  • random byte fault

Fingerprint

Dive into the research topics of 'Improved differential fault analysis on PRESENT-80/128'. Together they form a unique fingerprint.

Cite this