Paper 2014/572
On the Optimality of Differential Fault Analyses on CLEFIA
Juliane Krämer, Anke Stüber, and Ágnes Kiss
Abstract
Differential Fault Analysis is a powerful cryptanalytic tool to reveal secret keys of cryptographic algorithms. By corrupting the computation of an algorithm, an attacker gets additional information about the secret key. In 2012, several Differential Fault Analyses on the AES cipher were analyzed from an information-theoretic perspective. This analysis exposed whether or not the leaked information was fully exploited. It revealed if an analysis was already optimal or if it could still be improved. We applied the same approach to all existing Differential Fault Analyses on the CLEFIA cipher. We show that only some of these attacks are already optimal. We improve those analyses which did not exploit all information. With one exception, all attacks against CLEFIA-128 reach the theoretical limit after our improvement. Our improvement of an attack against CLEFIA-192 and CLEFIA-256 reduces the number of fault injections to the lowest possible number reached to date.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- CLEFIADifferential Fault AnalysisFault Attack
- Contact author(s)
- juliane @ sec t-labs tu-berlin de
- History
- 2014-07-24: received
- Short URL
- https://ia.cr/2014/572
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/572, author = {Juliane Krämer and Anke Stüber and Ágnes Kiss}, title = {On the Optimality of Differential Fault Analyses on {CLEFIA}}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/572}, year = {2014}, url = {https://eprint.iacr.org/2014/572} }