Skip to main content
Top
Published in: Cryptography and Communications 1/2015

01-03-2015

Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers

Authors: Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta

Published in: Cryptography and Communications | Issue 1/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent literature, the differential fault analysis (DFA) on Grain family of stream ciphers has been shown to exploit the low algebraic degree of the derivative of the nonlinear combining function h of the stream cipher, h(x) ⊕ h(xα). The low algebraic degree allows the DFA adversary to create a linearly independent system of equations generated from the faulty and fault-free keystreams and use these equations to extract the initial state of the NFSR and LFSR stages in the stream cipher. In this paper, we propose a construction scheme for rotation symmetric Boolean functions (RSBFs) h(x) along with an orbit-tuple flip based iterative hill-climbing based construction algorithm for balanced RSBFs with high nonlinearity, low absolute indicator value of global avalanche characteristics (GAC), and high algebraic degree of h(x) ⊕ h(xα). The construction algorithm is scalable for higher input variables like n = 9,10,11 as shown in the paper. We find some interesting autocorrelation spectra and Walsh spectra properties for the class of RSBFs and then use them in the construction of RSBFs with improved cryptographic properties. We present the cryptographic properties of the RSBFs constructed for high input variables which can be used to make DFA attack harder using the existing techniques.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
2.
go back to reference Anderson, R.J., Kuhn, M.G.: Low cost attacks on tamper resistant devices. In: Security Protocols Workshop, pp. 125–136 (1997) Anderson, R.J., Kuhn, M.G.: Low cost attacks on tamper resistant devices. In: Security Protocols Workshop, pp. 125–136 (1997)
3.
go back to reference Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the grain family of stream ciphers. In: CHES, pp. 122–139 (2012) Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the grain family of stream ciphers. In: CHES, pp. 122–139 (2012)
4.
go back to reference Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the grain family under reasonable assumptions. In: INDOCRYPT, pp. 191–208 (2012) Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the grain family under reasonable assumptions. In: INDOCRYPT, pp. 191–208 (2012)
5.
go back to reference Berzati, A., Canovas-Dumas, C., Goubin, L.: Fault analysis of rabbit: Toward a secret key leakage. In: INDOCRYPT, pp. 72–87 (2009) Berzati, A., Canovas-Dumas, C., Goubin, L.: Fault analysis of rabbit: Toward a secret key leakage. In: INDOCRYPT, pp. 72–87 (2009)
6.
go back to reference Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: CRYPTO, pp. 513–525 (1997) Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: CRYPTO, pp. 513–525 (1997)
7.
go back to reference Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: EUROCRYPT, pp. 37–51 (1997) Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: EUROCRYPT, pp. 37–51 (1997)
8.
go back to reference Clark, J.A., Jacob, J.L., Maitra, S., Stanica, P.: Almost boolean functions: the design of boolean functions by spectral inversion. Comput. Intell. 20(3), 450–462 (2004)CrossRefMathSciNet Clark, J.A., Jacob, J.L., Maitra, S., Stanica, P.: Almost boolean functions: the design of boolean functions by spectral inversion. Comput. Intell. 20(3), 450–462 (2004)CrossRefMathSciNet
9.
go back to reference Dalai, D.K., Gupta, K.C., Maitra, S.: Results on algebraic immunity for cryptographically significant boolean functions. In: INDOCRYPT, pp. 92–106 (2004) Dalai, D.K., Gupta, K.C., Maitra, S.: Results on algebraic immunity for cryptographically significant boolean functions. In: INDOCRYPT, pp. 92–106 (2004)
10.
go back to reference Filiol, E., Fontaine, C.: Highly nonlinear balanced boolean functions with a good correlation-immunity. In: EUROCRYPT, pp. 475–488 (1998) Filiol, E., Fontaine, C.: Highly nonlinear balanced boolean functions with a good correlation-immunity. In: EUROCRYPT, pp. 475–488 (1998)
11.
go back to reference Fontaine, C.: On some cosets of the first-order reed-muller code with high minimum weight. IEEE Trans. Inf. Theory 45(4), 1237–1243 (1999)CrossRefMATHMathSciNet Fontaine, C.: On some cosets of the first-order reed-muller code with high minimum weight. IEEE Trans. Inf. Theory 45(4), 1237–1243 (1999)CrossRefMATHMathSciNet
13.
go back to reference Hell, M., Maximov, E., Maitra, S.: On efficient implementation of search strategy for rotation symmetric boolean functions. In: 9th International Workshop on Algebraic and Combinatoral Coding Theory, ACCT 2004, 2004-06-19/2006-06-25 (2004) Hell, M., Maximov, E., Maitra, S.: On efficient implementation of search strategy for rotation symmetric boolean functions. In: 9th International Workshop on Algebraic and Combinatoral Coding Theory, ACCT 2004, 2004-06-19/2006-06-25 (2004)
14.
go back to reference Hoch J.J., Shamir A.: Fault analysis of stream ciphers. In: Joye M., Quisquater J.J. (eds.) CHES, Lecture Notes in Computer Science, vol. 3156, pp. 240–253. Springer (2004) Hoch J.J., Shamir A.: Fault analysis of stream ciphers. In: Joye M., Quisquater J.J. (eds.) CHES, Lecture Notes in Computer Science, vol. 3156, pp. 240–253. Springer (2004)
15.
go back to reference Karmakar, S., Chowdhury, D.R.: Fault analysis of grain-128 by targeting NFSR. In: AFRICACRYPT, pp. 298–315 (2011) Karmakar, S., Chowdhury, D.R.: Fault analysis of grain-128 by targeting NFSR. In: AFRICACRYPT, pp. 298–315 (2011)
16.
go back to reference Kavut, S., Maitra, S., Yücel, M.D.: Search for boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans. Inf. Theory 53(5), 1743–1751 (2007)CrossRefMATH Kavut, S., Maitra, S., Yücel, M.D.: Search for boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans. Inf. Theory 53(5), 1743–1751 (2007)CrossRefMATH
17.
go back to reference Maximov, A., Hell, M., Maitra, S.: Plateaued rotation symmetric boolean functions on odd number of variables. In: 1st Workshop on Boolean Functions: Cryptography and Applications, BFCA, pp. 83–104 (2005) Maximov, A., Hell, M., Maitra, S.: Plateaued rotation symmetric boolean functions on odd number of variables. In: 1st Workshop on Boolean Functions: Cryptography and Applications, BFCA, pp. 83–104 (2005)
18.
go back to reference Preneel, B., Leekwijck, W.V., Linden, L.V., Govaerts, R., Vandewalle, J.: Propagation characteristics of boolean functions. In: EUROCRYPT, pp. 161–173 (1990) Preneel, B., Leekwijck, W.V., Linden, L.V., Govaerts, R., Vandewalle, J.: Propagation characteristics of boolean functions. In: EUROCRYPT, pp. 161–173 (1990)
19.
go back to reference Quan, L., Guang-pu, G., Wen-fen, L.: Analysis of properties and counting of orbits for k-rotation symetric Boolean functions. J. Commun. 33(1), 114–119 (2012) Quan, L., Guang-pu, G., Wen-fen, L.: Analysis of properties and counting of orbits for k-rotation symetric Boolean functions. J. Commun. 33(1), 114–119 (2012)
20.
go back to reference Sarkar, S., Banik, S., Maitra, S.: Differential fault attack against grain family with very few faults and minimal assumptions. IACR Cryptol. ePrint Arch. 2013, 494 (2013) Sarkar, S., Banik, S., Maitra, S.: Differential fault attack against grain family with very few faults and minimal assumptions. IACR Cryptol. ePrint Arch. 2013, 494 (2013)
21.
go back to reference Skorobogatov, S.P.: Optically enhanced position-locked power analysis. In: CHES, pp. 61–75 (2006) Skorobogatov, S.P.: Optically enhanced position-locked power analysis. In: CHES, pp. 61–75 (2006)
22.
go back to reference Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: CHES, pp. 2–12 (2002) Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: CHES, pp. 2–12 (2002)
23.
go back to reference Stanica, P., Maitra, S.: Rotation symmetric boolean functions - count and cryptographic properties. Electron Notes Discrete Math. 15, 139–145 (2003)CrossRefMathSciNet Stanica, P., Maitra, S.: Rotation symmetric boolean functions - count and cryptographic properties. Electron Notes Discrete Math. 15, 139–145 (2003)CrossRefMathSciNet
24.
go back to reference Stanica, P., Maitra, S., Clark, J.A.: Results on rotation symmetric bent and correlation immune Boolean functions. In: FSE, pp. 161–177 (2004) Stanica, P., Maitra, S., Clark, J.A.: Results on rotation symmetric bent and correlation immune Boolean functions. In: FSE, pp. 161–177 (2004)
25.
go back to reference Su, S., Tang, X.: Construction of Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity and High Nonlinearity. Des. Codes Cryptogr. (2012) Su, S., Tang, X.: Construction of Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity and High Nonlinearity. Des. Codes Cryptogr. (2012)
Metadata
Title
Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
Authors
Bodhisatwa Mazumdar
Debdeep Mukhopadhyay
Indranil Sengupta
Publication date
01-03-2015
Publisher
Springer US
Published in
Cryptography and Communications / Issue 1/2015
Print ISSN: 1936-2447
Electronic ISSN: 1936-2455
DOI
https://doi.org/10.1007/s12095-014-0108-3

Other articles of this Issue 1/2015

Cryptography and Communications 1/2015 Go to the issue

Premium Partner