|
Fault analysis of Kuznyechik
R. AlTawy, O. Duman, A. M. Youssef Concordia University, Montréal, Québec, Canada
Abstract:
We present two fault analysis attacks on the new cipher Kuznyechik. In the differential fault attack the attacker is assumed to be able to fault a random byte in rounds seven and eight. It enables the attacker to recover the master key using an average of four faults. Another attack considers the cipher with a secret S-box. Utilizing an ineffective fault analysis in the byte stuck-at-zero fault model, we present an attack to recover both the master key and the secret S-box parameters. Both attacks demonstrate the importance of protecting the hardware and software implementations of the new standard even if its S-box is kept secret.
Key words:
Kuznyechik, differential fault analysis, ineffective fault analysis, GOST-Grasshopper.
Received 01.III.2015
Citation:
R. AlTawy, O. Duman, A. M. Youssef, “Fault analysis of Kuznyechik”, Mat. Vopr. Kriptogr., 7:2 (2016), 21–34
Linking options:
https://www.mathnet.ru/eng/mvk180https://doi.org/10.4213/mvk180 https://www.mathnet.ru/eng/mvk/v7/i2/p21
|
Statistics & downloads: |
Abstract page: | 547 | Full-text PDF : | 329 | References: | 50 | First page: | 5 |
|