• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Wei, Cao Shan, Gu Dawu, Li Jiayao, Wang Menglin, Cai Tianpei, Shi Xiujin. Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2216-2228. DOI: 10.7544/issn1000-1239.2019.20190406
Citation: Li Wei, Cao Shan, Gu Dawu, Li Jiayao, Wang Menglin, Cai Tianpei, Shi Xiujin. Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2216-2228. DOI: 10.7544/issn1000-1239.2019.20190406

Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things

More Information
  • Published Date: September 30, 2019
  • The lightweight cryptosystem MIBS was proposed at the CANS conference in 2009. It has high efficiency in both hardware implementation and software implementation. MIBS can resist against classical cryptanalysis, such as differential analysis and linear analysis, etc. It is suitable for the resource-limited devices in the Internet of things. This paper proposes new ciphertext-only fault analysis of the MIBS cryptosystem. The attackers can apply a new fault model of Double AND and two novel distinguishers of Parzen-HW and Parzen-HW-MLE to break MIBS. The experiments only require at least 72 fault injections to recover the secret key with a success probability of no less than 99%. The method can further reduce fault injections and time, and effectively improve the attacking efficiency. It shows that the ciphertext-only fault analysis poses a serious threaten to the security of MIBS. The research also provides an important reference for the security analysis of other lightweight cryptosystems.
  • Related Articles

    [1]Yue Guangxue, Chen Guanglu, Lu Min, Yang Xiaohui, Liu Jianhua, Huang Chunlan, Yang Zhongming. A Computation Offloading Algorithm with Path Selection Based on K-shell Influence Maximization[J]. Journal of Computer Research and Development, 2021, 58(9): 2025-2039. DOI: 10.7544/issn1000-1239.2021.20200338
    [2]Cao Jiuxin, Gao Qingqing, Xia Rongqing, Liu Weijia, Zhu Xuelin, Liu Bo. Information Propagation Prediction and Specific Information Suppression in Social Networks[J]. Journal of Computer Research and Development, 2021, 58(7): 1490-1503. DOI: 10.7544/issn1000-1239.2021.20200809
    [3]Zhang Liqing, Guo Dong, Wu Shaoling, Cui Haibo, Wang Wei. An Ultra Lightweight Container that Maximizes Memory Sharing and Minimizes the Runtime Environment[J]. Journal of Computer Research and Development, 2019, 56(7): 1545-1555. DOI: 10.7544/issn1000-1239.2019.20180511
    [4]Yan Xiaoqiang, Ye Yangdong. Cross-Media Clustering by Share and Private Information Maximization[J]. Journal of Computer Research and Development, 2019, 56(7): 1370-1382. DOI: 10.7544/issn1000-1239.2019.20180470
    [5]Zhang Fenxiang, Chen Huahui, Qian Jiangbo, Dong Yihong. HSSM: A Hierarchical Method for Streaming Submodular Maximization[J]. Journal of Computer Research and Development, 2016, 53(8): 1792-1805. DOI: 10.7544/issn1000-1239.2016.20160140
    [6]Li Xiaokang, Zhang Xi, Sun Hao, Sun Guangzhong. Influence Maximization Across Multi-Channels in Social Network[J]. Journal of Computer Research and Development, 2016, 53(8): 1709-1718. DOI: 10.7544/issn1000-1239.2016.20160211
    [7]Guo Jingfeng, Lü Jiaguo. Influence Maximization Based on Information Preference[J]. Journal of Computer Research and Development, 2015, 52(2): 533-541. DOI: 10.7544/issn1000-1239.2015.20131311
    [8]Zhu Xiang, Jia Yan, Nie Yuanping, Qu Ming. Event Propagation Analysis on Microblog[J]. Journal of Computer Research and Development, 2015, 52(2): 437-444. DOI: 10.7544/issn1000-1239.2015.20140187
    [9]Chen Hao and Wang Yitong. Threshold-Based Heuristic Algorithm for Influence Maximization[J]. Journal of Computer Research and Development, 2012, 49(10): 2181-2188.
    [10]Qi Yingjian, Luo Siwei, Huang Yaping, Li Aijun, Liu Yunhui. An Annealing Expectation Maximization Algorithm[J]. Journal of Computer Research and Development, 2006, 43(4): 654-660.

Catalog

    Article views (1240) PDF downloads (350) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return