Fault Analysis of the KATAN Family of Block Ciphers

In this paper, we investigate the security of the KATAN family of block ciphers against differential fault attacks. KATAN consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32,KATAN48 and KATAN64, respectively. All three variants have the same key length of 80 bits. We assume...

Full description

Saved in:
Bibliographic Details
Main Author: Abdul Latip, Shekh Faisal
Format: Conference or Workshop Item
Language:English
Published: 2012
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/3181/1/Paper62.pdf
http://eprints.utem.edu.my/id/eprint/3181/
http://www.springerlink.com/content/d56776k687xl3g35/about/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknikal Malaysia Melaka
Language: English
id my.utem.eprints.3181
record_format eprints
spelling my.utem.eprints.31812015-05-28T02:33:42Z http://eprints.utem.edu.my/id/eprint/3181/ Fault Analysis of the KATAN Family of Block Ciphers Abdul Latip, Shekh Faisal QA75 Electronic computers. Computer science In this paper, we investigate the security of the KATAN family of block ciphers against differential fault attacks. KATAN consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32,KATAN48 and KATAN64, respectively. All three variants have the same key length of 80 bits. We assume a single-bit fault injection model where the adversary is supposed to be able to corrupt a single random bit of the internal state of the cipher and this fault injection process can be repeated (by resetting the cipher); i.e., the faults are transient rather than permanent. First, we determine suitable rounds for effective fault injections by analyzing distributions of low-degree (mainly, linear and quadratic) polynomial equations obtainable using the cube and extended cube attack techniques. Then, we show how to identify the exact position of faulty bits within the internal state by precomputing difference characteristics for each bit position at a given round and comparing these characteristics with ciphertext differences (XOR of faulty and non-faulty ciphertexts) during the online phase of the attack. The complexity of our attack on KATAN32 is 2^59 computations and about 115 fault injections. For KATAN48 and KATAN64, the attack requires 2^55 computations (for both variants), while the required number of fault injections is 211 and 278, respectively. 2012-04-02 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/3181/1/Paper62.pdf Abdul Latip, Shekh Faisal (2012) Fault Analysis of the KATAN Family of Block Ciphers. In: Information Security Practice and Experience 2012 (ISPEC 2012), 9 - 12 April 2012, Hangzhou, China. http://www.springerlink.com/content/d56776k687xl3g35/about/
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Abdul Latip, Shekh Faisal
Fault Analysis of the KATAN Family of Block Ciphers
description In this paper, we investigate the security of the KATAN family of block ciphers against differential fault attacks. KATAN consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32,KATAN48 and KATAN64, respectively. All three variants have the same key length of 80 bits. We assume a single-bit fault injection model where the adversary is supposed to be able to corrupt a single random bit of the internal state of the cipher and this fault injection process can be repeated (by resetting the cipher); i.e., the faults are transient rather than permanent. First, we determine suitable rounds for effective fault injections by analyzing distributions of low-degree (mainly, linear and quadratic) polynomial equations obtainable using the cube and extended cube attack techniques. Then, we show how to identify the exact position of faulty bits within the internal state by precomputing difference characteristics for each bit position at a given round and comparing these characteristics with ciphertext differences (XOR of faulty and non-faulty ciphertexts) during the online phase of the attack. The complexity of our attack on KATAN32 is 2^59 computations and about 115 fault injections. For KATAN48 and KATAN64, the attack requires 2^55 computations (for both variants), while the required number of fault injections is 211 and 278, respectively.
format Conference or Workshop Item
author Abdul Latip, Shekh Faisal
author_facet Abdul Latip, Shekh Faisal
author_sort Abdul Latip, Shekh Faisal
title Fault Analysis of the KATAN Family of Block Ciphers
title_short Fault Analysis of the KATAN Family of Block Ciphers
title_full Fault Analysis of the KATAN Family of Block Ciphers
title_fullStr Fault Analysis of the KATAN Family of Block Ciphers
title_full_unstemmed Fault Analysis of the KATAN Family of Block Ciphers
title_sort fault analysis of the katan family of block ciphers
publishDate 2012
url http://eprints.utem.edu.my/id/eprint/3181/1/Paper62.pdf
http://eprints.utem.edu.my/id/eprint/3181/
http://www.springerlink.com/content/d56776k687xl3g35/about/
_version_ 1665905257530523648