RUS  ENG
Full version
JOURNALS // Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] // Archive

Mat. Vopr. Kriptogr., 2016 Volume 7, Issue 2, Pages 21–34 (Mi mvk180)

Fault analysis of Kuznyechik

R. AlTawy, O. Duman, A. M. Youssef

Concordia University, Montréal, Québec, Canada

Abstract: We present two fault analysis attacks on the new cipher Kuznyechik. In the differential fault attack the attacker is assumed to be able to fault a random byte in rounds seven and eight. It enables the attacker to recover the master key using an average of four faults. Another attack considers the cipher with a secret S-box. Utilizing an ineffective fault analysis in the byte stuck-at-zero fault model, we present an attack to recover both the master key and the secret S-box parameters. Both attacks demonstrate the importance of protecting the hardware and software implementations of the new standard even if its S-box is kept secret.

Key words: Kuznyechik, differential fault analysis, ineffective fault analysis, GOST-Grasshopper.

UDC: 519.719.2

Received 01.III.2015

Language: English

DOI: 10.4213/mvk180



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024