Paper 2012/030

Fault Analysis of the KATAN Family of Block Ciphers

Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, and Jennifer Seberry

Abstract

In this paper, we investigate security of the KATAN family of block ciphers against differential fault attacks. KATAN consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64, respectively. All three variants have the same key length of 80 bits. We assume a single-bit fault injection model where the adversary is supposed to be able to corrupt a single random bit of the internal state of the cipher and this fault induction process can be repeated (by resetting the cipher); i.e., the faults are transient rather than permanent. First, we show how to identify the exact position of faulty bits within the internal state by precomputing difference characteristics for each bit position at a given round and comparing these characteristics with ciphertext differences (XOR of faulty and non-faulty ciphertexts) during the online phase of the attack. Then, we determine suitable rounds for effective fault inductions by analyzing distributions of low-degree (mainly, linear and quadratic) polynomial equations obtainable using the cube and extended cube attack techniques. The complexity of our attack on KATAN32 is $2^{59}$ computations and about 115 fault injections. For KATAN48 and KATAN64, the attack requires $2^{55}$ computations (for both variants), while the required number of fault injections is 211 and 278, respectively.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. To appear in ISPEC 2012.
Keywords
Block CiphersCube AttackDifferential Fault AnalysisKATAN
Contact author(s)
rezar @ uow edu au
History
2012-02-03: revised
2012-01-29: received
See all versions
Short URL
https://ia.cr/2012/030
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/030,
      author = {Shekh Faisal Abdul-Latip and Mohammad Reza Reyhanitabar and Willy Susilo and Jennifer Seberry},
      title = {Fault Analysis of the {KATAN} Family of Block Ciphers},
      howpublished = {Cryptology {ePrint} Archive, Paper 2012/030},
      year = {2012},
      url = {https://eprint.iacr.org/2012/030}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.