248
Views
16
CrossRef citations to date
0
Altmetric
Original Articles

Improved differential fault analysis on PRESENT-80/128

, , &
Pages 2553-2563 | Received 20 Jul 2012, Accepted 13 Dec 2012, Published online: 19 Mar 2013
 

Abstract

PRESENT is a hardware-optimized 64-bit lightweight block cipher which supports 80- and 128-bit secret keys. In this paper, we propose a differential fault analysis (DFA) on PRESENT-80/128. The proposed attack is based on a 2-byte random fault model. In detail, by inducing several 2-byte random faults in input registers after 28 rounds, our attack recovers the secret key of the target algorithm. From simulation results, our attacks on PRESENT-80/128 can recover the secret key by inducing only two and three 2-byte random faults, respectively. These are superior to known DFA results on them.

2010 AMS Subject Classifications:

Acknowledgements

This work was supported by the 2011 Research Fund of the University of Seoul for Jaechul Sung. Also this research was supported by the MKE (the Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support programme (NIPA-2012-H0301-12-3007) supervised by the NIPA (National IT Industry Promotion Agency) for Kitae Jeong, Yuseop Lee and Seokhie Hong.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 1,129.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.