In this paper we propose improved Differential Fault Analysis (DFA) on the block cipher Camellia with a 128-bit key. Existing DFAs on Camellia-128 require several faults induced at multiple rounds, at least two of which must be induced at or after the 16-th round. On the other hand, by utilizing longer fault propagation paths than the existing DFAs, the proposed attacks require random byte faults to targeted byte positions induced only at the 14-th round. The simulation results confirm the feasibility of the proposed attacks. Our attacks indicate that the last 5 rounds of Camellia-128, two more rounds compared with the existing DFAs, must be protected against DFAs.
CITATION STYLE
Akishita, T., & Kunihiro, N. (2016). Improved differential fault analysis on camellia-128. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9689, pp. 130–143). Springer Verlag. https://doi.org/10.1007/978-3-319-43283-0_8
Mendeley helps you to discover research relevant for your work.