TY - EJOU
AU - Long, Min
AU - Kong, Man
AU - Long, Sai
AU - Zhang, Xiang
TI - An Improved Differential Fault Analysis on Block Cipher KLEIN-64
T2 - Computers, Materials \& Continua
PY - 2020
VL - 65
IS - 2
SN - 1546-2226
AB - KLEIN-64 is a lightweight block cipher designed for resource-constrained
environment, and it has advantages in software performance and hardware
implementation. Recent investigation shows that KLEIN-64 is vulnerable to differential
fault attack (DFA). In this paper, an improved DFA is performed to KLEIN-64. It is
found that the differential propagation path and the distribution of the S-box can be fully
utilized to distinguish the correct and wrong keys when a half-byte fault is injected in the
10^{th} round. By analyzing the difference matrix before the last round of S-box, the location
of fault injection can be limited to a small range. Thus, this improved analysis can greatly
improve the attack efficiency. For the best case, the scale of brute-force attack is only 256.
While for the worst case, the scale of brute-force attack is far less than 2^{32} with another
half byte fault injection, and the probability for this case is 1/64. Furthermore, the
measures for KLEIN-64 in resisting the improved DFA are proposed.
KW - Block cipher
KW - KLEIN-64
KW - differential fault analysis
KW - half-byte fault injection
DO - 10.32604/cmc.2020.011116