Journal on Communications ›› 2019, Vol. 40 ›› Issue (11): 122-137.doi: 10.11959/j.issn.1000-436x.2019204

• Papers • Previous Articles     Next Articles

Ciphertext-only fault analysis of the SIMON lightweight cipher

Wei LI1,2,3,4,Yixin WU1,Dawu GU2,Jiayao LI1,Shan CAO1,Menglin WANG1,Tianpei CAI1,Xiangwu DING1(),Zhiqiang LIU2   

  1. 1 School of Computer Science and Technology,Donghua University,Shanghai 201620,China
    2 Department of Computer Science and Engineering,Shanghai Jiao Tong University,Shanghai 200240,China
    3 Shanghai Key Laboratory of Scalable Computing and Systems,Shanghai 200240,China
    4 Shanghai Key Laboratory of Integrate Administration Technologies for Information Security,Shanghai 200240,China
  • Revised:2019-08-28 Online:2019-11-25 Published:2019-12-06
  • Supported by:
    The National Natural Science Foundation of China(61772129);The National Natural Science Foundation of China(61672347);The National Cryptography Development Fund(MMJJ20180101)

Abstract:

The ciphertext-only fault analysis on the SIMON cipher was proposed by injecting a random nibble fault under the random nibble fault model.After injecting faults,every faulty ciphertext could be decrypted and the statistical distribution of all intermediate states were analyzed by the attackers.On the basis of the previous distinguishers of SEI,GF,MLE,MLE-SEI,GF-SEI and GF-MLE,four novel distinguishers of GF-MAP,HW-MLE,GF-HW and HW-MAP were proposed to reduce faults.The results show that the SIMON cipher cannot resist against the ciphertext-only fault analysis.It provides an important reference for security analysis of other ciphers.

Key words: lightweight cipher, SIMON, ciphertext-only fault analysis

CLC Number: 

No Suggested Reading articles found!