Paper 2025/496

Shortcut2Secrets: A Table-based Differential Fault Attack Framework

Weizhe Wang, Shanghai Jiao Tong University
Pierrick Méaux, University of Luxembourg
Deng Tang, Shanghai Jiao Tong University
Abstract

Recently, Differential Fault Attacks (DFAs) have proven highly effective against stream ciphers designed for Hybrid Homomorphic Encryption (HHE). In this work, we present a table-based DFA framework called the \textit{shortcut attack}, which generalizes the attack proposed by Wang and Tang on the cipher \textsf{Elisabeth}. The framework applies to a broad sub-family of ciphers following the Group Filter Permutator (GFP) paradigm and enhances previous DFAs by improving both the fault identification and path generation steps. Notably, the shortcut attack circumvents the issue of function representation, allowing successful attacks even when the cipher's filter function cannot be represented over the ring it is defined on. Additionally, we provide complexity estimates for the framework and apply the shortcut attack to \textsf{Elisabeth-4} and its patches. As a result, we optimize the DFA on \textsf{Elisabeth-4}, requiring fewer keystreams and running faster than previous methods. Specifically, we achieve a DFA that requires only $3000$ keystreams, which is one-fifth of the previous best result. We also successfully mount a practical DFA on \textsf{Gabriel-4} and provide a theoretical DFA for \textsf{Elisabeth-b4}. For the latest patch, \textsf{Margrethe-18-4}, which follows the more general Mixed Filter Permutator (MFP) paradigm, we present a DFA in a stronger model. To the best of our knowledge, these are the first DFA results on the patches of \textsf{Elisabeth-4}. Finally, we derive security margins to prevent shortcut attacks on a broad sub-family of MFP ciphers, which can serve as parameter recommendations for designers.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
A minor revision of an IACR publication in TCHES 2025
DOI
10.46586/tches.v2025.i2.385-419
Keywords
Differential Fault AttackHybrid Homomorphic EncryptionElisabeth-4Elisabeth-b4Gabriel-4Margrethe-18-
Contact author(s)
SJTUwwz @ sjtu edu cn
pierrick meaux @ uni lu
dengtang @ sjtu edu cn
History
2025-03-17: approved
2025-03-16: received
See all versions
Short URL
https://ia.cr/2025/496
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/496,
      author = {Weizhe Wang and Pierrick Méaux and Deng Tang},
      title = {{Shortcut2Secrets}: A Table-based Differential Fault Attack Framework},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/496},
      year = {2025},
      doi = {10.46586/tches.v2025.i2.385-419},
      url = {https://eprint.iacr.org/2025/496}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.