The TWINE is a new Generalized Feistel Structure (GFS) lightweight cryptosystem in the Internet of Things. It has 36 rounds and the key lengths support 80 bits and 128 bits, which are flexible to provide security for the RFID, smart cards and other highly-constrained devices. Due to the strong attacking ability, fast speed, simple implementation and other characteristics, the differential fault analysis has become an important method to evaluate the security of lightweight cryptosystems. On the basis of the 4-bit fault model and the differential analysis, we propose an effective differential fault attack on the TWINE cryptosystem. Mathematical analysis and simulating experiments show that the attack could recover its 80-bit and 128-bit secret keys by introducing 8 faulty ciphertexts and 18 faulty ciphertexts on average, respectively. The result in this study describes that the TWINE is vulnerable to differential fault analysis. It will be beneficial to the analysis of the same type of other iterated lightweight cryptosystems in the Internet of Things.
CITATION STYLE
Li, W., Zhang, W., Gu, D., Tao, Z., Zhou, Z., Liu, Y., & Liu, Z. (2015). Security analysis of the lightweight cryptosystem twine in the internet of things. KSII Transactions on Internet and Information Systems, 9(2), 793–810. https://doi.org/10.3837/tiis.2015.02.018
Mendeley helps you to discover research relevant for your work.