Paper 2013/191

Improved Differential Fault Analysis on ARIA using Small Number of Faults

Yuseop Lee, Kitae Jeong, Jaechul Sung, and Seokhie Hong

Abstract

In [15], Li et al. firstly proposed a differential fault analysis on ARIA-128. This attack requires average 45 random byte fault injections. In 2012, Park et al. proposed the improve DFA by using 33 random byte fault injection. Also Kim proposed differential fault analysis based on multi byte fault model. In this model, the number of fault injections is reduce to 13 and If access to the decryption oracle is allowed, only 7 faults are required. In this paper, we propose improved differential fault analysis on ARIA. Based on random byte fault model, the proposed attacks can recover the secret key of ARIA-128/192/256 by using 6 fault injections within a few minutes. Moreover, in cases of ARIA-128 and ARIA-256, it is possible to recover the secret key using only 4 fault injections under a fault assumption where an attacker can induce some faults during both encryption and decryption process, respectively. Our results on ARIA-192/256 are the first known DFA results on them.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
Differential fault analysisBlock cipherARIACryptanalysis
Contact author(s)
yusubi @ korea ac kr
History
2013-04-02: received
Short URL
https://ia.cr/2013/191
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/191,
      author = {Yuseop Lee and Kitae Jeong and Jaechul Sung and Seokhie Hong},
      title = {Improved Differential Fault Analysis on {ARIA} using Small Number of Faults},
      howpublished = {Cryptology {ePrint} Archive, Paper 2013/191},
      year = {2013},
      url = {https://eprint.iacr.org/2013/191}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.