Differential fault analysis on block cipher SEED

Differential fault analysis on block cipher SEED

0.00 Avg rating0 Votes
Article ID: iaor201111195
Volume: 55
Issue: 1-2
Start Page Number: 26
End Page Number: 34
Publication Date: Jan 2012
Journal: Mathematical and Computer Modelling
Authors: , , ,
Keywords: security
Abstract:

SEED is a Korean standard block cipher, and it is chosen as a 128‐bit ISO/IEC standard block cipher together with AES and Camellia. In this paper, we propose a differential fault analysis on SEED on the basis of the bit‐oriented model. Our fault model on SEED‐128 is more flexible than the previous fault model on SEED‐128. And our attack results on SEED‐192/256 are the first known cryptanalytic results. From the simulation results, our attack on SEED‐128 can recover a 128‐bit secret key within a few seconds by inducing four faults. However, the computational complexities of our attack on SEED‐192/256 are impractical.

Reviews

Required fields are marked *. Your email address will not be published.