Advanced Search
    Li Wei, Cao Shan, Gu Dawu, Li Jiayao, Wang Menglin, Cai Tianpei, Shi Xiujin. Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2216-2228. DOI: 10.7544/issn1000-1239.2019.20190406
    Citation: Li Wei, Cao Shan, Gu Dawu, Li Jiayao, Wang Menglin, Cai Tianpei, Shi Xiujin. Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2216-2228. DOI: 10.7544/issn1000-1239.2019.20190406

    Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things

    • The lightweight cryptosystem MIBS was proposed at the CANS conference in 2009. It has high efficiency in both hardware implementation and software implementation. MIBS can resist against classical cryptanalysis, such as differential analysis and linear analysis, etc. It is suitable for the resource-limited devices in the Internet of things. This paper proposes new ciphertext-only fault analysis of the MIBS cryptosystem. The attackers can apply a new fault model of Double AND and two novel distinguishers of Parzen-HW and Parzen-HW-MLE to break MIBS. The experiments only require at least 72 fault injections to recover the secret key with a success probability of no less than 99%. The method can further reduce fault injections and time, and effectively improve the attacking efficiency. It shows that the ciphertext-only fault analysis poses a serious threaten to the security of MIBS. The research also provides an important reference for the security analysis of other lightweight cryptosystems.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return