Improved differential fault analysis of Grain128-AEAD

Tianyu Fang, Iftekhar Salam, Wei‐Chuen Yau
{"title":"Improved differential fault analysis of Grain128-AEAD","authors":"Tianyu Fang, Iftekhar Salam, Wei‐Chuen Yau","doi":"10.20517/jsss.2023.42","DOIUrl":null,"url":null,"abstract":"The number of smart devices connected to the Internet has been constantly increasing, and as a result, lightweight cryptography (LWC) has become more important in the past decade. The Lightweight Cryptography (LWC) Project is an initiative taken by the National Institute of Standards and Technology (NIST) to standardize such LWC algorithms. Grain128-AEAD, which was submitted to the NIST LWC project, is an encryption algorithm that provides both confidentiality and integrity assurance. Third-party security analysis of the submitted ciphers is an important aspect of the evaluation of the submission to the NIST LWC project. Although several pieces of existing research, such as the bit-flipping attack, random fault attack, and deterministic random fault attack, have examined the security of Grain128-AEAD, there is still room for improvement in the fault attack models of these studies. This work aims to fill this research gap by analyzing the security margin of Grain128-AEAD against a series of improved differential fault attacks. In this study, we developed a probabilistic random fault attack and applied it to Grain128-AEAD. As an improvement of the existing research, a probabilistic approach can be applied to a more relaxed moderate control attack model. The existing moderate control model assumes the fault to be injected within any bit of a given byte, whereas the faults in our improved approach can be injected within any bits of a two-byte/four-byte segment, thereby relaxing the fault precision. The results indicate that the improved moderate control requires 388 keystreams for the two-byte model and 279 for the four-byte model to identify the target fault locations for implementing a state recovery attack. The relaxed fault attack models presented in this work are more practical to implement; hence, the findings of this research have improved the existing studies and narrowed the current research gap on the fault attack models of Grain128-AEAD. % To maintain consistency in terminology, \"Grain-128AEAD\" has been revised to \"Grain128-AEAD\" in both the abstract and the main text. Please confirm this revision.","PeriodicalId":509397,"journal":{"name":"Journal of Surveillance, Security and Safety","volume":"2 12","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Surveillance, Security and Safety","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20517/jsss.2023.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The number of smart devices connected to the Internet has been constantly increasing, and as a result, lightweight cryptography (LWC) has become more important in the past decade. The Lightweight Cryptography (LWC) Project is an initiative taken by the National Institute of Standards and Technology (NIST) to standardize such LWC algorithms. Grain128-AEAD, which was submitted to the NIST LWC project, is an encryption algorithm that provides both confidentiality and integrity assurance. Third-party security analysis of the submitted ciphers is an important aspect of the evaluation of the submission to the NIST LWC project. Although several pieces of existing research, such as the bit-flipping attack, random fault attack, and deterministic random fault attack, have examined the security of Grain128-AEAD, there is still room for improvement in the fault attack models of these studies. This work aims to fill this research gap by analyzing the security margin of Grain128-AEAD against a series of improved differential fault attacks. In this study, we developed a probabilistic random fault attack and applied it to Grain128-AEAD. As an improvement of the existing research, a probabilistic approach can be applied to a more relaxed moderate control attack model. The existing moderate control model assumes the fault to be injected within any bit of a given byte, whereas the faults in our improved approach can be injected within any bits of a two-byte/four-byte segment, thereby relaxing the fault precision. The results indicate that the improved moderate control requires 388 keystreams for the two-byte model and 279 for the four-byte model to identify the target fault locations for implementing a state recovery attack. The relaxed fault attack models presented in this work are more practical to implement; hence, the findings of this research have improved the existing studies and narrowed the current research gap on the fault attack models of Grain128-AEAD. % To maintain consistency in terminology, "Grain-128AEAD" has been revised to "Grain128-AEAD" in both the abstract and the main text. Please confirm this revision.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
改进的 Grain128-AEAD 差分故障分析
连接到互联网的智能设备数量不断增加,因此,轻量级密码学(LWC)在过去十年中变得越来越重要。轻量级密码学(LWC)项目是由美国国家标准与技术研究院(NIST)发起的一项倡议,旨在将此类轻量级密码学算法标准化。提交给 NIST LWC 项目的 Grain128-AEAD 是一种既能保证机密性又能保证完整性的加密算法。对提交的密码进行第三方安全分析,是对提交给 NIST LWC 项目的密码进行评估的一个重要方面。尽管现有的一些研究,如比特翻转攻击、随机故障攻击和确定性随机故障攻击等,都对 Grain128-AEAD 的安全性进行了研究,但这些研究的故障攻击模型仍有改进的余地。本研究旨在通过分析 Grain128-AEAD 抵御一系列改进的差分故障攻击的安全裕度来填补这一研究空白。在这项研究中,我们开发了一种概率随机故障攻击,并将其应用于 Grain128-AEAD。作为对现有研究的改进,概率方法可应用于更宽松的适度控制攻击模型。现有的适度控制模型假定故障在给定字节的任意位内注入,而我们改进方法中的故障可以在两字节/四字节段的任意位内注入,从而放宽了故障精度。结果表明,改进后的适度控制方法在双字节模型中需要 388 个关键流,在四字节模型中需要 279 个关键流,才能确定实施状态恢复攻击的目标故障位置。本研究中提出的宽松故障攻击模型在实施上更加实用;因此,本研究的结果改进了现有研究,缩小了目前在 Grain128-AEAD 故障攻击模型方面的研究差距。为保持术语的一致性,摘要和正文中的 "Grain-128AEAD "均已修改为 "Grain128-AEAD"。请确认这一修改。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
TENNER: intrusion detection models for industrial networks based on ensemble learning Improved differential fault analysis of Grain128-AEAD A survey on wireless-communication vulnerabilities of ERTMS in the railway sector A TPRF-based pseudo-random number generator Bias and fairness in software and automation tools in digital forensics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1