Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks
Autor: | Ya Liu, Wei Li, Zhihong Zhou, Zhiqiang Liu, Zhang Wenwen, Zhi Tao, Cao Yanqin, Dawu Gu |
---|---|
Rok vydání: | 2016 |
Předmět: |
Authentication
Differential fault analysis Wireless ad hoc network business.industry Computer science Byte 020206 networking & telecommunications 02 engineering and technology Computer security computer.software_genre Encryption Resource (project management) Software deployment 0202 electrical engineering electronic engineering information engineering Cryptosystem 020201 artificial intelligence & image processing Electrical and Electronic Engineering business computer Computer network |
Zdroj: | IEEE Transactions on Dependable and Secure Computing. 13:84-92 |
ISSN: | 1545-5971 |
Popis: | With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting traffic related information, the vehicular ad-hoc networks (VANETs) have emerged as a new application scenario that is envisioned to revolutionize the human driving experiences and traffic flow control systems. To avoid any possible malicious attack and resource abuse, employing lightweight cryptosystems is widely recognized as one of the most effective approaches for the VANETs to achieve confidentiality, integrity and authentication. As a typical substitution-permutation network lightweight cryptosystem, LED supports 64-bit and 128-bit secret keys, which are flexible to provide security for the RFID and other highly-constrained devices in the VANETs. Since its introduction, some research of fault analysis has been devoted to attacking the last three rounds of LED. It is an open problem to know whether provoking faults at a former round of LED allows recovering the secret key. In this paper, we give an answer to this problem by showing a novel impossible differential fault analysis on one round earlier of all LED keysize variants. Mathematical analysis and simulating experiments show that the attack could recover the 64-bit and 128–bit secret keys of LED by introducing 48 faults and 96 faults in average, respectively. The result in this study describes that LED is vulnerable to a half byte impossible differential fault analysis. It will be beneficial to the analysis of the same type of other iterated lightweight cryptosystems in the VANETs. |
Databáze: | OpenAIRE |
Externí odkaz: |