Computer Science ›› 2017, Vol. 44 ›› Issue (7): 116-119.doi: 10.11896/j.issn.1002-137X.2017.07.022

Previous Articles     Next Articles

Differential Fault Analysis on DBlock Cipher Algorithm

LI Lang, ZOU Yi, LI Zhu-hua and LIU Bo-tao   

  • Online:2018-11-13 Published:2018-11-13

Abstract: DBlock algorithm is a new type of block cipher algorithm proposed in 2015. The packet length and its corresponding key length are 128bit,192bit and 256bit,with 20-round iterations of each.Based on byte fault model,the differential fault analysis on the DBlock was used on the key expansion to import a random fault in the 17th round.Experimental results show that the analysis can recover its primitive 128bit key only by introducing four fault ciphertexts.

Key words: Block cipher,DBlock,Differential fault analysis

[1] BIHAM E,SHAMIR A.Differential fault analysis of secret key cryptosystems[C]∥Proc of Advances in Cryptology-Crpto’97.1997:513-525.
[2] LI R L,SUN B,LI C,et al.Differential fault analysis on SMS4 using a single fault[J].Information Processing Letters,2011,111(4):156-163.
[3] WANG S Z,ZHAO X J,WANG T,et al.Wide Differentail Fault Analysis on MIBS[J].Computer Science,2011,38(4):122-124.(in Chinese) 王素贞,赵新杰,王韬,等.针对MIBS的宽度差分故障分析[J].计算机科学,2011,8(4):122-124.
[4] MORADI A,SHALMANI M T M,SALMASIZDEH M.A ge-neralized method of differential fault attack against AES cryptosystem[C]∥Proc of Cryptographic Hardware and Embedded System 2006.2006:91-100.
[5] XU P,WEI Y C,PAN X Z.Differential fault attack on TWINE[J].Application Research of Computer,2015,2(6):1796-1800.(in Chinese) 徐朋,魏悦川,潘晓中.轻量级分组密码TWINE的差分故障攻击[J].计算机应用研究,2015,2(6):1796-1800.
[6] WANG G I,WANG S H.Differential Fault Analysis on PRESENT Key Schedule[C]∥Proc of the 2010 International Confe-rence on Computational Intelligence and Security.2010:362-366.
[7] LI W.A Improved Method of Differential Fault Analysis onSMS4 key Schedule[C]∥Proc of the 2010 2nd International Conference on Future Computer and Communication.2010:95-99.
[8] WU W L,ZHANG L,YU X L.The DBlock family of block ciphers[J].Science China Information Sciences,2015,58(3):1-14.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!