Paper 2025/771

Differential Fault Attacks on TFHE-friendly cipher

Weizhe Wang, Shanghai Jiao Tong University
Deng Tang, Shanghai Jiao Tong University
Abstract

Differential Fault Attacks (DFAs) have recently emerged as a significant threat against stream ciphers specifically designed for Hybrid Homomorphic Encryption (HHE). In this work, we propose DFAs on the cipher, which is a cipher specifically tailored for Torus-based Fully Homomorphic Encryption (TFHE). The round function of employs random S-boxes to minimize the number of rounds, and can be efficiently evaluated in TFHE. With our specific key recovery strategy, we can mount the DFA with a few faults. Under the assumption of precise fault injection, our DFA can recover the key within one second using just 4 or 6 faults. When discarding the assumption and considering a more practical fault model, we can still achieve key recovery in a few minutes without increasing the number of faults. To the best of our knowledge, this is the first third-party cryptanalysis on . We also explored countermeasures to protect . Our analysis revealed that negacyclic S-boxes, a key component of TFHE-friendly ciphers, are unsuitable for incorporating linear structures to resist DFA. Consequently, we recommend removing the negacyclic restriction in the penultimate round of FRAST and introducing non-zero linear structures into the S-boxes of the last two rounds. We believe that our work will provide valuable insights for the design of TFHE-friendly ciphers.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Differential Fault AttackHybrid Homomorphic EncryptionTorus-based Fully Homomorphic EncryptionFRAST.
Contact author(s)
SJTUwwz @ sjtu edu cn
dengtang @ sjtu edu cn
History
2025-04-30: approved
2025-04-30: received
See all versions
Short URL
https://ia.cr/2025/771
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/771,
      author = {Weizhe Wang and Deng Tang},
      title = {Differential Fault Attacks on  {TFHE}-friendly cipher $\textsf{{FRAST}}$},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/771},
      year = {2025},
      url = {https://eprint.iacr.org/2025/771}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.