Journal on Communications ›› 2024, Vol. 45 ›› Issue (1): 141-151.doi: 10.11959/j.issn.1000-436x.2024019
• Papers • Previous Articles
Wei LI1,2,3,4, Wenqian SUN1, Dawu GU2, Ailin ZHANG1, Yunhua WEN1
Revised:
2023-12-08
Online:
2024-01-01
Published:
2024-01-01
Supported by:
CLC Number:
Wei LI, Wenqian SUN, Dawu GU, Ailin ZHANG, Yunhua WEN. Impossible statistical fault analysis of the PRIDE lightweight cryptosystem[J]. Journal on Communications, 2024, 45(1): 141-151.
[1] | SINGH R , BHUSHAN B . Evolving intelligent system for trajectory tracking of unmanned aerial vehicles[J]. IEEE Transactions on Automation Science and Engineering, 2022,19(3): 1971-1984. |
[2] | ALRAWI O , LEVER C , ANTONAKAKIS M ,et al. SoK:security evaluation of home-based IoT deployments[C]// Proceedings of IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2019: 1362-1380. |
[3] | 吴武飞, 李仁发, 曾刚 ,等. 智能网联车网络安全研究综述[J]. 通信学报, 2020,41(6): 161-174. |
WU W F , LI R F , ZENG G ,et al. Survey of the intelligent and connected vehicle cybersecurity[J]. Journal on Communications, 2020,41(6): 161-174. | |
[4] | 王圣宝, 周鑫, 文康 ,等. 适用于智能电网的三方认证密钥交换协议[J]. 通信学报, 2023,44(02): 210-218. |
WANG S B , ZHOU X , WEN K ,et al. Tripartite authenticated key exchange protocol for smart grid[J]. Journal on Communications, 2023,44(2): 210-218. | |
[5] | NAITO Y , SASAKI Y , SUGAWARA T . Lightweight authenticated encryption mode suitable for threshold implementation[C]// Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2020: 705-735. |
[6] | CHENG J , GUO S , HE J . An extended type-1 generalized Feistel networks:lightweight block cipher for IoT[J]. IEEE Internet of Things Journal, 2022,9(13): 11408-11421. |
[7] | CHENG H , GROSSSCH?DL J , MARSHALL B ,et al. RISC-V instruction set extensions for lightweight symmetric cryptography[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(1): 193-237. |
[8] | ZHU D , ZHANG R , OU L ,et al. Low-latency design and implementation of the squaring in class groups for verifiable delay function using redundant representation[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(1): 438-462. |
[9] | ALBRECHT M R , DRIESSEN B , KAVUN E B ,et al. Block ciphers –focus on the linear layer (feat.PRIDE)[C]// Proceedings of Advances in Cryptology. Berlin:Springer, 2014: 57-76. |
[10] | 伊文坛, 田亚, 陈少真 . 减缩轮PRIDE算法的线性分析[J]. 电子学报, 2017,45(2): 468-476. |
YIN W T , TIAN Y , CHEN S Z . Linear cryptanalysis of reduced-round PRIDE block cipher[J]. Chinese Journal of Electronics, 2017,45(2): 468-276. | |
[11] | LALLEMAND V , RASOOLZADEH S . Differential cryptanalysis of 18-round PRIDE[C]// Proceedings of International Conference on Cryptology in India. Berlin:Springer, 2017: 126-146. |
[12] | PAL D , MANDAL U , DAS A ,et al. Deep learning based differential classifier of PRIDE and RC5[C]// Proceedings of International Conference on Applicat ions and Techniques in Information Security. Berlin:Springer, 2023: 46-58. |
[13] | YANG Q , HU L , SUN S ,et al. Improved differential analysis of block cipher PRIDE[C]// Proceedings of International Conference on Information Security Practice and Experience. Berlin:Springer, 2015: 209-219. |
[14] | BONEH D , DEMILLO R A , LIPTON R J . On the importance of checking cryptographic protocols for faults[C]// Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1997: 37-51. |
[15] | FUHR T , JAULMES E , LOMNE V ,et al. Fault attacks on AES with faulty ciphertexts only[C]// Proceedings of Workshop on Fault Diagnosis and Toler ance in Cryptography. Piscataway:IEEE Press, 2013: 108-118. |
[16] | CLAVIER C . Secret external encodings do not prevent transient fault analysis[C]// Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2007: 181-194. |
[17] | BIHAM E , SHAMIR A . Differential fault analysis of secret key cryptosystems[C]// Proceedings of Annual International Cryptology Conference. Berlin:Springer, 1997: 513-525. |
[18] | DERBEZ P , FOUQUE P A , LERESTEUX D . Meet-in-the-middle and impossible differential fault analysis on AES[C]// Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2011: 274-291. |
[19] | ZHANG F , LOU X , ZHAO X ,et al. Persistent fault analysis on block ciphers[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(3): 150-172. |
[20] | JANA A , PAUL G . Differential fault attack on PHOTON-Beetle[C]// Proceedings of Workshop on Attacks and Solutions in Hardware Security. New York:ACM Press, 2022: 25-34. |
[21] | ZHANG F , FENG T , LI Z ,et al. Free fault leakages for deep exploitation:algebraic persistent fault analysis on lightweight block ciphers[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(2): 289-311. |
[22] | 王永娟, 樊昊鹏, 代政一 ,等. 侧信道攻击与防御技术研究进展[J]. 计算机学报, 2023,46(1): 202-228. |
WANG Y J , FAN H P , DAI Z Y ,et al. Advances in side channel attacks and countermeasures[J]. Chinese Journal of Computers, 2023,46(1): 202-228. | |
[23] | 李玮, 刘春, 谷大武 ,等. Saturnin-Short 轻量级认证加密算法的统计无效故障分析[J]. 通信学报, 2023,44(4): 167-175. |
LI W , LIU C , GU D W ,et al. Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short[J]. Journal on Communications, 2023,44(4): 167-175. | |
[24] | LI W , LIAO L , GU D ,et al. Ciphertext-only fault analysis on the LED lightweight cryptosystem in the Internet of things[J]. IEEE Transactions on Dependable and Secure Computing, 2019,16(3): 454-461. |
[25] | LI W , LI J , GU D ,et al. Statistical fault analysis of the Simeck lightweight cipher in the ubiquitous sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 4224-4233. |
[26] | BIHAM E , BIRYUKOV A , SHAMIR A . Miss in the middle attacks on IDEA and Khufu[C]// Proceedings of International Workshop on Fast Software Encryption. Berlin:Springer, 1999: 124-138. |
[27] | BIHAM E , BIRYUKOV A , SHAMIR A . Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials[J]. Journal of Cryptology, 2005,18(4): 291-311. |
[28] | MOON D , HWANG K , LEE W ,et al. Impossible differential cryptanalysis of reduced round XTEA and TEA[C]// Proceedings of International Workshop on Fast Software Encryption. Berlin:Springer, 2002: 49-60. |
[29] | CHEN J , HU Y , ZHANG Y . Impossible differential cryptanalysis of advanced encryption standard[J]. Science China Information Sciences, 2007,50(3): 342-350. |
[30] | WU W , ZHANG L , ZHANG W . Improved impossible differential cryptanalysis of reduced-round Camellia[C]// Proceedings of International Workshop on Selected Areas in Cryptography. Berlin:Springer, 2009: 442-456. |
[31] | BOURA C , NAYA-PLASENCIA M , SUDER V . Scrutinizing and improving impossible differential attacks:applications to CLEFIA,Camellia,LBlock and Simon[C]// Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2014: 179-199. |
[32] | LIU Y , SHI Y , GU D ,et al. Improved impossible differential cryptanalysis of large-block Rijndael[J]. Science China Information Sciences, 2019,62(3): 1-14. |
[33] | DU J , WANG W , LI M ,et al. Related-tweakey impossible differential attack on QARMA-128[J]. Science China Information Sciences, 2019,62(3): 15-26. |
[34] | ZHANG L , WU W , MAO Y . Impossible differential cryptanalysis on reduced-round PRINCEcore[C]// Proceedings of International Conference on Inform ation Security and Cryptology. Berlin:Springer, 2023: 61-77. |
[35] | BIHAM E , GRANBOULAN L , NGUY?N P Q . Impossible fault analysis of RC4 and differential fault analysis of RC4[C]// Proceedings of Internation al Workshop on Fast Software Encryption. Berlin:Springer, 2005: 359-367. |
[36] | LI W , RIJMEN V , TAO Z ,et al. Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs[J]. Science China Information Sciences, 2018,61(3): 032110. |
[37] | REED I . A class of multiple-error-correcting codes and the decoding scheme[J]. Transactions of the IRE Professional Group on Information Theory, 1954,4(4): 38-49. |
[38] | WILKS S S . The large-sample distribution of the likelihood ratio for testing composite hypotheses[J]. The Annals of Mathematical Statistics, 1938,9(1): 60-62. |
[39] | PEARSON K X . On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling[J]. The London,Edinburgh,and Dublin Philosophical Magazine and Journal of Science, 1900,50(302): 157-175. |
[1] | Minqing ZHANG, Chao JIANG, Fuqiang DI, Zongbao JIANG, Xiong ZHANG. High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing [J]. Journal on Communications, 2023, 44(9): 48-57. |
[2] | Xiaoni DU, Xiangyu WANG, Lifang LIANG, Kaibin LI. Quantum cryptanalysis of lightweight block cipher Piccolo [J]. Journal on Communications, 2023, 44(6): 175-182. |
[3] | Wei LI, Chun LIU, Dawu GU, Wenqian SUN, Jianning GAO, Mengyang QIN. Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short [J]. Journal on Communications, 2023, 44(4): 167-175. |
[4] | Hua REN, Shaozhang NIU, Ruyong REN, Zhen YUE. Research on meaningful image encryption algorithm based on 2-dimensional compressive sensing [J]. Journal on Communications, 2022, 43(5): 45-57. |
[5] | Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG. Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration [J]. Journal on Communications, 2022, 43(5): 144-154. |
[6] | Changgen PENG, Ting GAO, Huilan LIU, Hongfa DING. PCA-based membership inference attack for machine learning models [J]. Journal on Communications, 2022, 43(1): 149-160. |
[7] | Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG. Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain [J]. Journal on Communications, 2021, 42(12): 236-246. |
[8] | Wei LI, Menglin WANG, Dawu GU, Jiayao LI, Tianpei CAI, Guangwei XU. Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm [J]. Journal on Communications, 2021, 42(3): 135-149. |
[9] | Ruiqi LI, Chunfu JIA, Yafei WANG. Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application [J]. Journal on Communications, 2021, 42(3): 11-22. |
[10] | Shufen NIU,Wenke LIU,Lixia CHEN,Caifen WANG,Xiaoni DU. Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain [J]. Journal on Communications, 2020, 41(8): 204-214. |
[11] | Yiliang HAN,Zhong WANG. Code-based generalized signcryption scheme with multi-receiver [J]. Journal on Communications, 2020, 41(1): 53-65. |
[12] | Youliang TIAN,Kedi YANG,Zuan WANG,Tao FENG. Algorithm of blockchain data provenance based on ABE [J]. Journal on Communications, 2019, 40(11): 101-111. |
[13] | Wei LI,Yixin WU,Dawu GU,Jiayao LI,Shan CAO,Menglin WANG,Tianpei CAI,Xiangwu DING,Zhiqiang LIU. Ciphertext-only fault analysis of the SIMON lightweight cipher [J]. Journal on Communications, 2019, 40(11): 122-137. |
[14] | Xiaodong YANG,Yutong LI,Jinli WANG,Tingchun MA,Caifen WANG. Revocable identity-based proxy re-signature scheme in the standard model [J]. Journal on Communications, 2019, 40(5): 153-162. |
[15] | Yu SHEN,Wei LI,Dawu GU,Yixin WU,Shan CAO,Ya LIU,Zhiqiang LIU,Zhihong ZHOU. Integral fault analysis of the ARIA cipher [J]. Journal on Communications, 2019, 40(2): 164-173. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|