Linked Ineffective Fault Analysis on DES Cipher

Document Type : Research Article

Authors

1 Cyber Research Center, Shahid Beheshti University (SBU), Tehran, Iran

2 Department of Communication, Faculty of Electrical Engineering, Shahid Rajaee Teacher Training University, Tehran, Iran

10.22042/isecure.2026.242055
Abstract
Linked Ineffective Fault Analysis (LIFA) is a novel fault analysis technique that operates without requiring input control and demonstrates resilience against noise compared to Statistical Ineffective Fault Analysis (SIFA), while maintaining similar attack assumptions. However, prior studies on LIFA have focused primarily on SPN block ciphers, leaving the security of the DES cipher one of the Feistel ciphers unexplored. Furthermore, the application of LIFA in the presence of multiple faults remains unaddressed. This paper bridges these gaps by applying LIFA to the widely utilized DES cipher, aiming to evaluate the effectiveness of this attack on Feistel-based structures. We effectively apply LIFA across various scenarios and demonstrate the feasibility of inducing multiple linked faults. Our results reveal that the nibble-based structure of DES allows for the establishment of two simultaneous links instead of one, significantly enhancing the efficacy of fault attacks on DES. To validate our approach, we conducted both simulations and real-world experiments using frequency glitch fault injection on an ATMEGA328p microcontroller. The results show that the proposed LIFA framework for the DES cipher achieves superior performance compared to existing methods such as SIFA, further advancing the state of cryptographic fault analysis.

Keywords


[1] Dan Boneh, Richard A. DeMillo, and Richard J. Lipton. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In Walter Fumy, editor, Advances in Cryptology - EUROCRYPT ’97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz Germany, May 11-15, 1997, Proceeding, volume 1233 of Lecture Notes in Computer Science, pages 37–51. Springer, 1997.
[2] Andrea Caforio and Subhadeep Banik. A study of persistent fault analysis. In Security, Privacy, and Applied Cryptography Engineering: 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings 9, pages 13–33. Springer, 2019.
[3] Fan Zhang, Xiaoxuan Lou, Xinjie Zhao, Shivam Bhasin, Wei He, Ruyi Ding, Samiya Qureshi, and Kui Ren. Persistent fault analysis on block ciphers. IACR Transactions on Cryptographic Hardware and Embedded Systems, pages 150–172, 2018.
[4] Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu, Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, and Kui Ren. Persistent Fault Attack in Practice. IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020(2):172– 195, 2020.
[5] Susanne Engels, Falk Schellenberg, and Christof Paar. SPFA: SFA on Multiple Persistent Faults. In 17th Workshop on Fault Detection and Tolerance in Cryptography, FDTC.
[6] Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, and Hadi Soleimany. SIPFA: statistical ineffective persistent faults analysis on Feistel ciphers. IACR Transactions on Cryptographic Hardware and Embedded Systems, pages 367–390, 2022.
[7] Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, and Sara Mansouri. Practical multiple persistent faults analysis. Cryptology ePrint Archive, 2021.
[8] Eli Biham and Adi Shamir. Differential fault analysis of secret key cryptosystems. In Advances in Cryptology—CRYPTO’97: 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17–21, 1997 Proceedings 17, pages 513–525. Springer, 1997.
[9] Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, and Zhiqiang Liu. Impossible differential fault analysis on the LED lightweight cryptosystem in the vehicular ad-hoc networks. IEEE Transactions on Dependable and Secure Computing, 13(1):84–92, 2015.
[10] Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta. Fault sensitivity analysis. In Cryptographic Hardware and Embedded Systems, CHES2010: 12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings 12, pages 320–334. Springer, 2010.
[11] Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa Taha, and Patrick Schaumont. Differential fault intensity analysis. In 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, pages 49–58. IEEE, 2014.
[12] Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, and Debdeep Mukhopadhyay. Fault template attacks on block ciphers exploiting fault propagation. In Advances in Cryptology– EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10– 14, 2020, Proceedings, Part I 39, pages 612–643. Springer, 2020.
[13] Ali Asghar Beigizad, Hadi Soleimany, Sara Zarei, and Hamed Ramzanipour. Linked fault analysis. IEEE Transactions on Information Forensics and Security, 19:632–645, 2024.
[14] Christoph Dobraunig, Maria Eichlseder,Thomas Korak, Stefan Mangard, Florian Mendel, and Robert Primas. SIFA: exploiting ineffective fault inductions on symmetric cryptography. IACR Transactions on Cryptographic Hardware and Embedded Systems, pages 547–572, 2018.
[15] Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, and ClaireWhelan. Thesorcerer’s apprentice guide to fault attacks. Proceedings of the IEEE, 94(2):370–382, 2006.
[16] Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, and Hadi Soleimany. Statistical effective fault attacks: the other side of the coin. IEEE Transactions on Information Forensics and Security, 17:1855–1867, 2022.
[17] Karine Heydemann, Nicolas Moro, Emmanuelle Encrenaz, and Bruno Robisson. Formal verification of a software countermeasure against instruction skip attacks. IACR Cryptol. ePrintArch., 2013:679, 2013.

Articles in Press, Accepted Manuscript
Available Online from 19 March 2026