Paper 2015/347
Fault Analysis of Kuznyechik
Riham AlTawy, Onur Duman, and Amr M. Youssef
Abstract
Kuznyechik is an SPN block cipher that has been chosen recently to be standardized by the Russian federation as a new GOST cipher. In this paper, we present two fault analysis attacks on two different settings of the cipher. The first attack is a differential fault attack which employs the random byte fault model, where the attacker is assumed to be able to fault a random byte in rounds seven and eight. Using this fault model enables the attacker to recover the master key using an average of four faults. The second attack considers the cipher with a secret sbox. By utilizing an ineffective fault analysis in the byte stuck-at-zero fault model, we present a four stage attack to recover both the master key and the secret sbox parameters. Our second attack is motivated by the fact that, similar to GOST 28147-89, Kuznyechik is expected to include the option of using secret sbox based on the user supplied key to increase its security margin. Both the presented attacks have practical complexities and aim to demonstrate the importance of protecting the hardware and software implementations of the new standard even if its sbox is kept secret.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. CTCrypt 2015
- Keywords
- KuznyechikDifferential fault analysisIneffective fault analysisGOSTGrasshopper
- Contact author(s)
- r altawy @ gmail com
- History
- 2015-04-23: received
- Short URL
- https://ia.cr/2015/347
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/347, author = {Riham AlTawy and Onur Duman and Amr M. Youssef}, title = {Fault Analysis of Kuznyechik}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/347}, year = {2015}, url = {https://eprint.iacr.org/2015/347} }