Paper 2014/572

On the Optimality of Differential Fault Analyses on CLEFIA

Juliane Krämer, Anke Stüber, and Ágnes Kiss

Abstract

Differential Fault Analysis is a powerful cryptanalytic tool to reveal secret keys of cryptographic algorithms. By corrupting the computation of an algorithm, an attacker gets additional information about the secret key. In 2012, several Differential Fault Analyses on the AES cipher were analyzed from an information-theoretic perspective. This analysis exposed whether or not the leaked information was fully exploited. It revealed if an analysis was already optimal or if it could still be improved. We applied the same approach to all existing Differential Fault Analyses on the CLEFIA cipher. We show that only some of these attacks are already optimal. We improve those analyses which did not exploit all information. With one exception, all attacks against CLEFIA-128 reach the theoretical limit after our improvement. Our improvement of an attack against CLEFIA-192 and CLEFIA-256 reduces the number of fault injections to the lowest possible number reached to date.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
CLEFIADifferential Fault AnalysisFault Attack
Contact author(s)
juliane @ sec t-labs tu-berlin de
History
2014-07-24: received
Short URL
https://ia.cr/2014/572
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/572,
      author = {Juliane Krämer and Anke Stüber and Ágnes Kiss},
      title = {On the Optimality of Differential Fault Analyses on CLEFIA},
      howpublished = {Cryptology ePrint Archive, Paper 2014/572},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/572}},
      url = {https://eprint.iacr.org/2014/572}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.