Paper 2016/623
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
Dhiman Saha and Dipanwita Roy Chowdhury
Abstract
This work exploits internal differentials within a cipher in the context of Differential Fault Analysis (DFA). This in turn overcomes the nonce barrier which acts as a natural counter-measure against DFA. We introduce the concept of internal differential fault analysis which requires only one faulty ciphertext. In particular, the analysis is applicable to parallelizable ciphers that use the counter-mode. As a proof of concept we develop an internal differential fault attack called EnCounter on PAEQ which is an AES based parallelizable authenticated cipher presently in the second round of on-going CAESAR competition. The attack is able to uniquely retrieve the key of three versions of full-round PAEQ of key-sizes 64, 80 and 128 bits with complexities of about $2^{16}$, $2^{16}$ and $2^{50}$ respectively. Finally, this work addresses in detail the instance of fault analysis with varying amounts of partial state information and also presents the first analysis of PAEQ.
Metadata
- Available format(s)
- Publication info
- Published by the IACR in CHES 2016
- Keywords
- fault analysisauthenticated encryptionPAEQinternal differentialAESQnonceAES
- Contact author(s)
-
saha dhiman @ gmail com
drc @ cse iitkgp ernet in - History
- 2016-06-17: received
- Short URL
- https://ia.cr/2016/623
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/623, author = {Dhiman Saha and Dipanwita Roy Chowdhury}, title = {{EnCounter}: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on {PAEQ}}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/623}, year = {2016}, url = {https://eprint.iacr.org/2016/623} }