Paper 2025/496
Shortcut2Secrets: A Table-based Differential Fault Attack Framework
Abstract
Recently, Differential Fault Attacks (DFAs) have proven highly effective against stream ciphers designed for Hybrid Homomorphic Encryption (HHE). In this work, we present a table-based DFA framework called the \textit{shortcut attack}, which generalizes the attack proposed by Wang and Tang on the cipher \textsf{Elisabeth}.
The framework applies to a broad sub-family of ciphers following the Group Filter Permutator (GFP) paradigm and enhances previous DFAs by improving both the fault identification and path generation steps. Notably, the shortcut attack circumvents the issue of function representation, allowing successful attacks even when the cipher's filter function cannot be represented over the ring it is defined on.
Additionally, we provide complexity estimates for the framework and apply the shortcut attack to \textsf{Elisabeth-4} and its patches. As a result, we optimize the DFA on \textsf{Elisabeth-4}, requiring fewer keystreams and running faster than previous methods. Specifically, we achieve a DFA that requires only
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- A minor revision of an IACR publication in TCHES 2025
- DOI
- 10.46586/tches.v2025.i2.385-419
- Keywords
- Differential Fault AttackHybrid Homomorphic EncryptionElisabeth-4Elisabeth-b4Gabriel-4Margrethe-18-
- Contact author(s)
-
SJTUwwz @ sjtu edu cn
pierrick meaux @ uni lu
dengtang @ sjtu edu cn - History
- 2025-03-17: approved
- 2025-03-16: received
- See all versions
- Short URL
- https://ia.cr/2025/496
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/496, author = {Weizhe Wang and Pierrick Méaux and Deng Tang}, title = {{Shortcut2Secrets}: A Table-based Differential Fault Attack Framework}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/496}, year = {2025}, doi = {10.46586/tches.v2025.i2.385-419}, url = {https://eprint.iacr.org/2025/496} }