Abstract
PRESENT is a hardware-optimized 64-bit lightweight block cipher which supports 80- and 128-bit secret keys. In this paper, we propose a differential fault analysis (DFA) on PRESENT-80/128. The proposed attack is based on a 2-byte random fault model. In detail, by inducing several 2-byte random faults in input registers after 28 rounds, our attack recovers the secret key of the target algorithm. From simulation results, our attacks on PRESENT-80/128 can recover the secret key by inducing only two and three 2-byte random faults, respectively. These are superior to known DFA results on them.
| Original language | English |
|---|---|
| Pages (from-to) | 2553-2563 |
| Number of pages | 11 |
| Journal | International Journal of Computer Mathematics |
| Volume | 90 |
| Issue number | 12 |
| DOIs | |
| State | Published - 2013 |
Keywords
- PRESENT
- block cipher
- cryptanalysis
- differential fault analysis
- random byte fault