Differential fault analysis on block cipher SEED

Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong

    Research output: Contribution to journalArticlepeer-review

    15 Citations (Scopus)

    Abstract

    SEED is a Korean standard block cipher, and it is chosen as a 128-bit ISO/IEC standard block cipher together with AES and Camellia. In this paper, we propose a differential fault analysis on SEED on the basis of the bit-oriented model. Our fault model on SEED-128 is more flexible than the previous fault model on SEED-128. And our attack results on SEED-192/256 are the first known cryptanalytic results. From the simulation results, our attack on SEED-128 can recover a 128-bit secret key within a few seconds by inducing four faults. However, the computational complexities of our attack on SEED-192/256 are impractical.

    Original languageEnglish
    Pages (from-to)26-34
    Number of pages9
    JournalMathematical and Computer Modelling
    Volume55
    Issue number1-2
    DOIs
    Publication statusPublished - 2012 Jan

    Bibliographical note

    Funding Information:
    This work was supported by a National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST) (No. 2010-0000261 ).

    Keywords

    • Block cipher
    • Differential fault analysis
    • SEED

    ASJC Scopus subject areas

    • Modelling and Simulation
    • Computer Science Applications

    Fingerprint

    Dive into the research topics of 'Differential fault analysis on block cipher SEED'. Together they form a unique fingerprint.

    Cite this