Dependency of lightweight block ciphers over S-boxes: A deep learning based analysis
Lightweight ciphers have been proposed from time to time to tackle various usage issues in IoT (Internet of Things) scenario. PRESENT and DoT are two such ciphers. PRESENT has been a benchmark cipher to establish and validate the security features of any new lightweight block cipher. This paper pres...
Saved in:
Published in | Journal of discrete mathematical sciences & cryptography Vol. ahead-of-print; no. ahead-of-print; pp. 1 - 21 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Taylor & Francis
17.11.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Lightweight ciphers have been proposed from time to time to tackle various usage issues in IoT (Internet of Things) scenario. PRESENT and DoT are two such ciphers. PRESENT has been a benchmark cipher to establish and validate the security features of any new lightweight block cipher. This paper presents deep learning based analysis of a widely known lightweight cipher PRESENT and relatively less known lightweight cipher DoT. Our observations show that both the ciphers are extremely sensitive to any intentional or unintentional error occurring in their S-boxes. In our experiments, these two ciphers maintain the desired immunity to such errors when either of the randomly generated ten non-linear S-boxes are used in their corresponding algorithms. However, the ciphers fail to withstand our deep learning based attack when either no S-box is used or a reverse S-box is used in their algorithms. This work validates the fact that S-box should always be carefully chosen while designing a block cipher. The observations from our work suggest the designers to be observant towards vulnerabilities arising out of any intentional fault attacks from the adversary. |
---|---|
ISSN: | 0972-0529 2169-0065 |
DOI: | 10.1080/09720529.2021.1932889 |