Journal on Communications ›› 2021, Vol. 42 ›› Issue (3): 135-149.doi: 10.11959/j.issn.1000-436x.2021039

• Papers • Previous Articles     Next Articles

Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm

Wei LI1,2,3,4, Menglin WANG1, Dawu GU2, Jiayao LI1, Tianpei CAI1, Guangwei XU1   

  1. 1 School of Computer Science and Technology, Donghua University, Shanghai 201620, China
    2 Department of Computer and Science and Engineering, Shanghai Jiao Tong University, Shanghai 200204, China
    3 Shanghai Key Laboratory of Scalable Computing and System, Shanghai Jiao Tong University, Shanghai 200204, China
    4 Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, Shanghai Jiao Tong University, Shanghai 200093, China
  • Revised:2020-11-05 Online:2021-03-25 Published:2021-03-01
  • Supported by:
    The National Natural Science Foundation of China(61772129);The National Cryptography Development Fund(MMJJ20180101);The Natural Science Foundation of Shanghai(19ZR1402000);Shanghai Key Laboratory of Scalable Computing and Systems;Shanghai Key Laboratory of Integrate Administration Technologies for Information Security

Abstract:

The security analysis of TWINE against the ciphertext-only fault analysis was proposed.The secret key of TWINE could be recovered with a success probability at least 99% using a series of distinguishers of SEI、MLE、HW、GF、GF-SEI、GF-MLE、Parzen-HW、MLE-HE、HW-HE and HW-MLE-HE.Among them, the novel proposed distinguishers of MLE-HE、HW-HE and HW-MLE-HE can effectively reduce the faults and improve the attack efficiency in simulating experiments.It provides a significant reference for analyzing the security of lightweight ciphers in the Internet of Things.

Key words: lightweight cryptogram, TWINE, ciphertext-only fault analysis, Internet of things

CLC Number: 

No Suggested Reading articles found!