Cryptology ePrint Archive: Report 2013/191
Improved Differential Fault Analysis on ARIA using Small Number of Faults
Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
Abstract: In , Li et al. firstly proposed a differential fault analysis on ARIA-128. This attack requires average 45 random byte fault injections. In 2012, Park et al. proposed the improve DFA by using 33 random byte fault injection. Also Kim proposed differential fault analysis based on multi byte fault model. In this model, the number of fault injections is reduce to 13 and If access to the decryption oracle is allowed, only 7 faults are required. In this paper, we propose improved differential fault analysis on ARIA. Based on random byte fault model, the proposed attacks can recover the secret key of ARIA-128/192/256 by using 6 fault injections within a few minutes. Moreover, in cases of ARIA-128 and ARIA-256, it is possible to recover the secret key using only 4 fault injections under a fault assumption where an attacker can induce some faults during both encryption and decryption process, respectively.
Our results on ARIA-192/256 are the first known DFA results on them.
Category / Keywords: secret-key cryptography / Differential fault analysis, Block cipher, ARIA, Cryptanalysis
Date: received 2 Apr 2013
Contact author: yusubi at korea ac kr
Available format(s): PDF | BibTeX Citation
Version: 20130402:145407 (All versions of this report)
Short URL: ia.cr/2013/191
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]