Paper 2024/1927

ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials

Anup Kumar Kundu, Indian Statistical Institute
Shibam Ghosh, University of Haifa
Aikata Aikata, Graz University of Technology
Dhiman Saha, Indian Institute of Technology Bhilai
Abstract

In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically verifiable attacks on bit-oriented ciphers like GIFT and BAKSHEESH. The idea used stems from the fact that truncated differential paths induced due to fault injection in certain intermediate rounds of the ciphers lead to active SBox-es in subsequent rounds whose inputs admit specific truncated differences. This leads to a (multi-round) impossible differential distinguisher, which can be incrementally leveraged for key-guess elimination via partial decryption. The key-space reduction further exploits the multi-round impossibility, capitalizing on the relations due to the quotient-remainder (QR) groups of the GIFT and BAKSHEESH linear layer, which increases the filtering capability of the distinguisher. Moreover, the primary observations made in this work are independent of the actual SBox. Clock glitch based fault attacks were mounted on 8-bit implementations of GIFT-64/GIFT-128 using a ChipWhisperer Lite board on an 8-bit ATXmega128D4-AU micro-controller. Unique key recovery was achieved for GIFT-128 with 3 random byte faults, while for GIFT-64, key space was reduced to $2^{32}$, the highest achievable for GIFT-64, with a single level fault due to its key-schedule. This work also reports the highest fault injection penetration for any variant of GIFT and BAKSHEESH. Finally, this work reiterates the role of classical cryptanalysis strategies in fault vulnerability assessment while leading to the most efficient fault attacks on GIFT.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Fault AnalysisImpossible DifferentialGIFTBAKSHEESH
Contact author(s)
anupkundumath @ gmail com
sghosh03 @ campus haifa ac il
aikata @ iaik tugraz at
dhiman @ iitbhilai ac in
History
2024-11-29: approved
2024-11-27: received
See all versions
Short URL
https://ia.cr/2024/1927
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1927,
      author = {Anup Kumar Kundu and Shibam Ghosh and Aikata Aikata and Dhiman Saha},
      title = {{ToFA}: Towards Fault Analysis of {GIFT} and {GIFT}-like Ciphers Leveraging Truncated Impossible Differentials},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1927},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1927}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.