An Improved DEFAULT-like Cipher via Dynamic Secret S-Boxes Against Differential Fault Attack

Linyang Yan, Huijiao Wang, Yongzhuang Wei
{"title":"An Improved DEFAULT-like Cipher via Dynamic Secret S-Boxes Against Differential Fault Attack","authors":"Linyang Yan, Huijiao Wang, Yongzhuang Wei","doi":"10.1109/CSP58884.2023.00035","DOIUrl":null,"url":null,"abstract":"DEFAULT block cipher presented at ASIACRYPT 2021 was specially designed against differential fault attack (DFA). However, the security of DEFAULT against Information Combining Differential Fault Attack (IC-DFA) was further checked at EUROCRYPT 2022. It is illustrated that IC-DFA can recover the secret key of DEFAULT with less than 100 faults and negligible computational complexity. In this article, a variant cipher based on linear structure and dynamic secret S-box (called DEFAULT-DS) is proposed. More precisely, DEFAULT-DS introduces 15 secret S-boxes, where the selection of these S-boxes is determined by using the round subkey. Moreover, the experimental results show that DEFAULT-DS achieves better security level and stronger resistance against DFA compared with original DEFAULT. In particular, DEFAULT-DS can resist to both the classical DFA and IC-DFA. Furthermore, the software implementation complexity of DEFAULT-DS is similar as DEFAULT.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP58884.2023.00035","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

DEFAULT block cipher presented at ASIACRYPT 2021 was specially designed against differential fault attack (DFA). However, the security of DEFAULT against Information Combining Differential Fault Attack (IC-DFA) was further checked at EUROCRYPT 2022. It is illustrated that IC-DFA can recover the secret key of DEFAULT with less than 100 faults and negligible computational complexity. In this article, a variant cipher based on linear structure and dynamic secret S-box (called DEFAULT-DS) is proposed. More precisely, DEFAULT-DS introduces 15 secret S-boxes, where the selection of these S-boxes is determined by using the round subkey. Moreover, the experimental results show that DEFAULT-DS achieves better security level and stronger resistance against DFA compared with original DEFAULT. In particular, DEFAULT-DS can resist to both the classical DFA and IC-DFA. Furthermore, the software implementation complexity of DEFAULT-DS is similar as DEFAULT.
一种改进的基于动态秘密s盒的类默认密码对抗差分故障攻击
在ASIACRYPT 2021上展示的DEFAULT分组密码是专门针对差分故障攻击(DFA)而设计的。然而,DEFAULT对信息组合差分故障攻击(IC-DFA)的安全性在EUROCRYPT 2022上得到了进一步的检验。结果表明,IC-DFA可以在不超过100个错误的情况下恢复缺省密钥,计算复杂度可以忽略不计。本文提出了一种基于线性结构和动态秘密s盒的变型密码(DEFAULT-DS)。更准确地说,DEFAULT-DS引入了15个秘密s -box,其中这些s -box的选择是通过使用圆形子密钥来确定的。实验结果表明,与原始DEFAULT相比,DEFAULT- ds具有更好的安全级别和更强的抗DFA能力。特别是,DEFAULT-DS可以抵抗经典DFA和IC-DFA。此外,DEFAULT- ds的软件实现复杂度与DEFAULT相似。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信