Abstract
Rocca is the first dedicated cipher for 6G systems accepted in ToSC 2021 and will be presented at FSE 2022. In this paper we show that Rocca is susceptible to differential fault attack under the nonce reuse scenario. The attack outcome results in a complete internal state recovery by injecting \( 4\times 48 \) faults in three out of eight internal state registers. Since the round update function of Rocca is reversible it also allows for key recovery. To the best of our knowledge this is the first third party analysis of Rocca.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bartlett, H., Dawson, E., Qahur Al Mahri, H., Salam, M., Simpson, L., Wong, K.K.H.: Random fault attacks on a class of stream ciphers. Secur. Commun. Netw. 2019, 12 (2019)
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997). https://doi.org/10.1007/3-540-69053-0_4
Berti, F., Guo, C., Pereira, O., Peters, T., Standaert, F.X.: TEDT, a leakage-resilient AEAD mode for high (Physical) security applications. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2020, num 1, pp 256–320 (2019)
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052259
Blömer, J., Seifert, J.-P.: Fault based cryptanalysis of the advanced encryption standard (AES). In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 162–181. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45126-6_12
Dey, P., Rohit, R.S., Sarkar, S., Adhikari, A.: Differential fault analysis on tiaoxin and AEGIS family of ciphers. In: Mueller, P., Thampi, S.M., Alam Bhuiyan, M.Z., Ko, R., Doss, R., Alcaraz Calero, J.M. (eds.) SSCC 2016. CCIS, vol. 625, pp. 74–86. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-2738-3_7
Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on A.E.S. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 293–306. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45203-4_23
Jean, J., Nikolić, I.: Efficient design strategies based on the AES round function. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 334–353. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-52993-5_17
Khairallah, M., Bhasin, S., Chattopadhyay, A.: On misuse of nonce-misuse resistance: adapting differential fault attacks on (few) CAESAR winners. In: 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI), pp. 189–193. IEEE (2019)
Khairallah, M., Hou, X., Najm, Z., Breier, J., Bhasin, S., Peyrin, T.: SoK: on DFA vulnerabilities of substitution-permutation networks. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 403–414 (2019)
Nikolic, I.: Tiaoxin-346 (version 2.1). CAESAR competition. Available from https://competitions.cr.yp.to/round3/tiaoxinv21.pdf
Sakamoto, K., Liu, F., Nakano, Y., Kiyomoto, S., Isobe, T.: Rocca: an efficient AES-based encryption scheme for beyond 5G. IACR Trans. Symmetric Cryptology 2021(2), 1–30 (2021)
Sakiyama, K., Li, Y., Iwamoto, M., Ohta, K.: Information-theoretic approach to optimal differential fault analysis. IEEE Trans. Inf. Forensics Secur. 7(1), 109–120 (2011)
Song, L., Tu, Y., Shi, D., Hu, L.: Security analysis of subterranean 2.0. Des. Codes Crypt. 89(8), 1875–1905 (2021). https://doi.org/10.1007/s10623-021-00892-6
Wong, K.K.-H., Bartlett, H., Simpson, L., Dawson, E.: Differential random fault attacks on certain CAESAR stream ciphers. In: Seo, J.H. (ed.) ICISC 2019. LNCS, vol. 11975, pp. 297–315. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-40921-0_18
Wu, H., Preneel, B.: AEGIS: a fast authenticated encryption algorithm (v1.1) CAESAR competition. https://competitions.cr.yp.to/round3/ aegisv11.pdf
Acknowledgement
Takanori Isobe is supported by JST, PRESTO Grant Number JPMJPR2031, Grant-in- Aid for Scientific Research (B)(KAKENHI 19H02141) for Japan Society for the Promotion of Science, and Support Center for Advanced Telecommunications Technology Research (SCAT).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Anand, R., Isobe, T. (2022). Differential Fault Attack on Rocca. In: Park, J.H., Seo, SH. (eds) Information Security and Cryptology – ICISC 2021. ICISC 2021. Lecture Notes in Computer Science, vol 13218. Springer, Cham. https://doi.org/10.1007/978-3-031-08896-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-031-08896-4_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-08895-7
Online ISBN: 978-3-031-08896-4
eBook Packages: Computer ScienceComputer Science (R0)