Differential fault attack on SPN-based sponge and SIV-like AE schemes
Amit Jana,Goutam Paul
DOI: https://doi.org/10.1007/s13389-024-00354-4
2024-05-26
Journal of Cryptographic Engineering
Abstract:This paper presents the first instance of a successful differential fault attack ( DFA ) on the nonce-based authentication scheme PHOTON-BEETLE , which was a finalist but not the winner of the NIST LwC competition. Furthermore, the paper also reveals the first differential fault attacks on several other NIST LwC schemes, including ORANGE , SIV-TEM-PHOTON , and ESTATE , which are based on sponge and SIV techniques. In general, it is a challenging task to perform DFA for any nonce-based sponge/ SIV -based AE because of a unique nonce in the encryption query. However, the decryption procedure (with a fixed nonce) is still susceptible to DFA . We propose different fault attack models, and also give theoretical estimates of the number of faulty queries to get multiple forgeries. Our simulated values corroborate closely the theoretical estimates. Finally, we devise an algorithm to recover the state based on the collected forgeries. Under the random fault attack model, to retrieve the secret key, we need approximately number of faulty queries. Also, the offline time and memory complexities of this attack are respectively and nibbles. Whereas, under the random bit fault attack model, around number of faulty queries are required to retrieve the key for PHOTON -based schemes and for AES -based scheme ESTATE . In the known fault attack model, we need around number of faulty queries to retrieve the secret key for PHOTON -based schemes and for AES -based scheme ESTATE . The time and memory complexities of the state recovery attack (for PHOTON -based schemes) are respectively and nibbles. Further, we have reduced the number of faulty queries to under the precise bit-flip fault model.
computer science, theory & methods