Differential fault analysis on Camellia

  • Authors:
  • Wei Li;Dawu Gu;Juanru Li;Zhiqiang Liu;Ya Liu

  • Affiliations:
  • School of Computer Science and Technology, Donghua University, Shanghai 201620, China and Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China

  • Venue:
  • Journal of Systems and Software
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Camellia is a 128-bit block cipher published by NTT and Mitsubishi in 2000. On the basis of the byte-oriented model and the differential analysis principle, we propose a differential fault attack on the Camellia algorithm. Mathematical analysis and simulating experiments show that our attack can recover its 128-bit, 192-bit or 256-bit secret key by introducing 30 faulty ciphertexts. Thus our result in this study describes that Camellia is vulnerable to differential fault analysis. This work provides a new reference to the fault analysis of other block ciphers.