Header menu link for other important links
X
Differential fault analysis on Tiaoxin and AEGIS family of ciphers
Published in Springer Verlag
2016
Volume: 625
   
Pages: 74 - 86
Abstract
Tiaoxin and AEGIS are two second round candidates of the ongoing CAESAR competition for authenticated encryption. In 2014, Brice Minaud proposed a distinguisher for AEGIS-256 that can be used to recover bits of a partially known message, encrypted 2188 times, regardless of the keys used. Also he reported a correlation between AEGIS-128 ciphertexts at rounds i and i + 2, although the biases would require 2140 data to be detected. Apart from that, to the best of our knowledge, there is no known cryptanalysis of AEGIS or Tiaoxin. In this paper we propose differential fault analyses of Tiaoxin and AEGIS family of ciphers in a nonce reuse setting. Analysis shows that the secret key of Tiaoxin can be recovered with 384 single bit faults and the states of AEGIS-128, AEGIS-256 and AEGIS-128L can be recovered respectively with 384, 512 and 512 single bit faults. Considering multi byte fault, the number of required faults and re-keying reduces 128 times. © Springer Nature Singapore Pte Ltd. 2016.
About the journal
JournalData powered by TypesetCommunications in Computer and Information Science
PublisherData powered by TypesetSpringer Verlag
ISSN18650929
Open AccessNo
Concepts (12)
  •  related image
    Authentication
  •  related image
    Cryptography
  •  related image
    Recovery
  •  related image
    AEAD
  •  related image
    AUTHENTICATED ENCRYPTION
  •  related image
    CIPHERTEXTS
  •  related image
    DISTINGUISHERS
  •  related image
    RECOVER BITS
  •  related image
    Secret key
  •  related image
    Single-bit
  •  related image
    Stream ciphers
  •  related image
    Side channel attack