EscApe: Diagonal fault analysis of APE

14Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This work presents an adaptation of the classical diagonal fault attack on APE which is a member of the PRIMATEs family of authenticated encryption (AE) schemes. APE is the first nonce misuseresistant permutation based AE scheme and is one of the submissions to the CAESAR competition. In this work we showcase how nonce reuse can be misused in the context of differential fault analysis of on-line authenticated encryption schemes like APE. Using the misuse, we finally present a diagonal fault attack on APE-80 that is able to reduce the key-search space from 2160 to 225 using just two random uni-word (A word in this context is a 5-bit vector.) diagonal faults. Increasing the number of faults to 4 results in the unique identification of the key with a high probability. We find that both the AES-like internal permutation and the last round cipher-text output contribute to the reduction in keyspace. We also provide theoretical analysis on the average reduction in the key-search space of the attack. To the best of our knowledge, this work reports the first fault analysis of a Sponge based mode of operation when used in the context of authenticated encryption.

Cite

CITATION STYLE

APA

Saha, D., Kuila, S., & Chowdhury, D. R. (2014). EscApe: Diagonal fault analysis of APE. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8885, pp. 197–216). Springer Verlag. https://doi.org/10.1007/978-3-319-13039-2_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free