SEED is a Korean standard block cipher, and it is chosen as a 128-bit ISO/IEC standard block cipher together with AES and Camellia. In this paper, we propose a differential fault analysis on SEED on the basis of the bit-oriented model. Our fault model on SEED-128 is more flexible than the previous fault model on SEED-128. And our attack results on SEED-192/256 are the first known cryptanalytic results. From the simulation results, our attack on SEED-128 can recover a 128-bit secret key within a few seconds by inducing four faults. However, the computational complexities of our attack on SEED-192/256 are impractical.
Bibliographical noteFunding Information:
This work was supported by a National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST) (No. 2010-0000261 ).
- Block cipher
- Differential fault analysis
ASJC Scopus subject areas
- Modelling and Simulation
- Computer Science Applications