• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Wei, Ge Chenyu, Gu Dawu, Liao Linfeng, Gao Zhiyong, Guo Zheng, Liu Ya, Liu Zhiqiang, Shi Xiujin. Research on the LED Lightweight Cipher Against the Statistical Fault Analysis in Internet of Things[J]. Journal of Computer Research and Development, 2017, 54(10): 2205-2214. DOI: 10.7544/issn1000-1239.2017.20170437
Citation: Li Wei, Ge Chenyu, Gu Dawu, Liao Linfeng, Gao Zhiyong, Guo Zheng, Liu Ya, Liu Zhiqiang, Shi Xiujin. Research on the LED Lightweight Cipher Against the Statistical Fault Analysis in Internet of Things[J]. Journal of Computer Research and Development, 2017, 54(10): 2205-2214. DOI: 10.7544/issn1000-1239.2017.20170437

Research on the LED Lightweight Cipher Against the Statistical Fault Analysis in Internet of Things

More Information
  • Published Date: September 30, 2017
  • The typical lightweight cipher LED, proposed in CHES 2011, is applied in the Internet of things (IoT) to provide security for RFID tags and smart cards etc. Fault analysis has become an important method of cryptanalysis to evaluate the security of lightweight ciphers, depending on its fast speed, simple implementation, complex defense, etc. On the basis of the half byte-oriented fault model, we propose new statistical fault analysis on the LED cipher by inducing faults. Simulating experiment shows that our attack can recover its 64-bit and 128-bit secret keys with 99% probability using an SEI distinguisher, a GF distinguisher and a GF-SEI distinguisher, respectively. The attack can be implemented in the ciphertext-only attacking environment to improve the attacking efficiency and decrease the number of faults. It provides vital reference for security analysis of other lightweight ciphers in the Internet of things.
  • Related Articles

    [1]Xing Zhaohui, Zhang Wenying, Cao Meichun. Integral Cryptanalysis on Lightweight Block Cipher WARP Based on the Algebraic Structure Perspective[J]. Journal of Computer Research and Development, 2023, 60(4): 860-872. DOI: 10.7544/issn1000-1239.202111169
    [2]Yao Hailong, Yan Qiao. Cryptanalysis and Design of Anonymous Authentication Protocol for Value-Added Services in Internet of Vehicles[J]. Journal of Computer Research and Development, 2022, 59(2): 440-451. DOI: 10.7544/issn1000-1239.20200487
    [3]Li Wei, Cao Shan, Gu Dawu, Li Jiayao, Wang Menglin, Cai Tianpei, Shi Xiujin. Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2216-2228. DOI: 10.7544/issn1000-1239.2019.20190406
    [4]Li Wei, Wu Yixin, Gu Dawu, Cao Shan, Liao Linfeng, Sun Li, Liu Ya, Liu Zhiqiang. Ciphertext-Only Fault Analysis of the LBlock Lightweight Cipher[J]. Journal of Computer Research and Development, 2018, 55(10): 2174-2184. DOI: 10.7544/issn1000-1239.2018.20180437
    [5]Yin Jun, Ma Chuyan, Song Jian, Zeng Guang, Ma Chuangui. Security Analysis of Lightweight Block Cipher ESF[J]. Journal of Computer Research and Development, 2017, 54(10): 2224-2231. DOI: 10.7544/issn1000-1239.2017.20170455
    [6]Cui Jingyi, Guo Jiansheng, Liu Yipeng. Impossible Differential Attack on Crypton[J]. Journal of Computer Research and Development, 2017, 54(7): 1525-1536. DOI: 10.7544/issn1000-1239.2017.20160415
    [7]Zheng Yafei, Wei Hongru. Biclique Cryptanalysis of Block Cipher SHACAL2[J]. Journal of Computer Research and Development, 2014, 51(10): 2329-2335. DOI: 10.7544/issn1000-1239.2014.20130639
    [8]Wei Hongru and Yin Guangli. Related-Key Impossible Differential Cryptanalysis on LBlock[J]. Journal of Computer Research and Development, 2014, 51(7): 1520-1526.
    [9]Gu Chunxiang, Zhu Yuefei, Zheng Yonghui, and Li Zheng. An Efficient Rainbow Table Structure and Faster Cryptanalytic Time-Memory Trad-off Attack[J]. Journal of Computer Research and Development, 2014, 51(5): 1089-1094.
    [10]Wang Xiaoming, Yao Guoxiang, and Liao Zhiwei. Cryptanalysis and Modification of a Traitor Tracing Scheme[J]. Journal of Computer Research and Development, 2013, 50(10): 2092-2099.

Catalog

    Article views (1707) PDF downloads (652) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return