Next Article in Journal
Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives
Previous Article in Journal
PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

General Extensions and Improvements of Algebraic Persistent Fault Analysis

by
Hanbing Li
1,2,
Kexin Qiao
1,*,
Ye Xu
2,
Changhai Ou
3 and
An Wang
1
1
School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China
2
No. 208 Research Institute of China Ordnance Industries, Beijing 102202, China
3
School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
*
Author to whom correspondence should be addressed.
Cryptography 2025, 9(2), 30; https://doi.org/10.3390/cryptography9020030
Submission received: 4 April 2025 / Revised: 30 April 2025 / Accepted: 7 May 2025 / Published: 10 May 2025
(This article belongs to the Topic Trends and Prospects in Security, Encryption and Encoding)

Abstract

:
Algebraic persistent fault analysis (APFA) combines algebraic analysis with persistent fault analysis, providing a novel approach for examining block cipher implementation security. Since its introduction, APFA has attracted considerable attention. Traditionally, APFA has assumed that fault injection occurs solely within the S-box during the encryption process. Yet, algorithms like PRESENT and AES also utilize S-boxes in the key scheduling phase, sharing the same S-box implementation as encryption. This presents a previously unaddressed challenge for APFA. In this work, we extend APFA’s fault injection and analysis capabilities to encompass the key scheduling stage, validating our approach on PRESENT. Our experimental findings indicate that APFA continues to be a viable approach. However, due to faults arising during the key scheduling process, the number of feasible candidate keys does not converge. To address this challenge, we expanded the depth of our fault analysis without increasing the number of faulty ciphertexts, effectively narrowing the key search space to near-uniqueness. By employing a compact S-box modeling approach, we were able to construct more concise algebraic equations with solving efficiency improvements ranging from tens to hundreds of times for PRESENT, SKINNY and CRAFT block ciphers. The efficiency gains became even more pronounced as the depth of the fault leakage increased, demonstrating the robustness and scalability of our approach.

1. Introduction

Information security has become a focal point, and cryptographic techniques are increasingly prevalent. Under resource constraints, lightweight block ciphers are widely used due to their simple architecture, high efficiency, and ease of implementation. Common lightweight block ciphers include PRESENT [1], GIFT [2], SKINNY [3], LED [4], CRAFT [5], etc.
Fault analysis (FA) is a specialized form of side-channel analysis that can be considered an active analysis method targeting physical cryptographic embedded devices [6]. It involves executing fault injection on a device to force it into an abnormal state and analyzing the collected faulty ciphertexts to recover keys using knowledge of the cryptographic algorithm. Fault injection can be achieved by altering power voltage [7], external clock frequency [8], or temperature [9], or exposing circuits to lasers [10] during key scheduling or encryption. There is also the permanent fault model, where attackers employ more aggressive means to damage cryptographic devices, resulting in persistent faults [10]. In 2024, Grandamme et al. demonstrated that laser fault injection can be performed on powered-off devices [11]. In 2017, Wagner et al. discussed side-channel attacks targeting the key scheduling phase [12], highlighting the necessity of paying sufficient attention to key scheduling in fault analysis.
Fault injection and its accompanying analysis techniques are among the most effective methods for analyzing cryptographic devices. The most renowned analysis technique in this field was the differential fault analysis (DFA), which utilizes the differences between the correct and faulty ciphertexts from fixed inputs to recover keys [13]. In 2010, Courtois et al. proposed algebraic fault analysis (AFA) [14], combining fault analysis with algebraic analysis. It translates differential fault information into algebraic equations and integrates them with encryption algorithms. Wagner et al. discussed side-channel attacks targeting the key scheduling phase [12], highlighting the necessity of paying sufficient attention to key scheduling in fault analysis. In 2018, Zhang et al. introduced a novel fault analysis method called persistent fault analysis (PFA) [15]. This approach was later improved and validated through physical experiments under traditional fault injection schemes [16], demonstrating the feasibility and generality of PFA on Substitution–Permutation Network (SPN) block ciphers. Their fault model lies between transient and permanent faults. Faults are injected into algorithm constants stored in Read-Only Memory (ROM), such as an element within an S-box. Unless the ROM is refreshed, the fault persists through all subsequent encryptions, affecting rounds accessing the specific faulty S-box element, and disappears once the fault-injected device is reset. PFA primarily conducts statistical analysis on the value distribution of ciphertext bytes and can be used as a ciphertext-only cryptanalysis method. In 2025, Nguyen et al. demonstrated that simple instruction skipping can be leveraged to mount PFA against AES [17].
In 2022, Zhang et al. introduced APFA [18], merging the persistent fault model with algebraic fault analysis. Faults are injected into S-boxes stored in memory, causing a deviation in one element. Since S-box data are bijective, data passing through the S-box during encryption deviate after fault injection, significantly enhancing the solving success rate and efficiency of algebraic analysis. Fang et al. decomposed 4-bit S-boxes into two 2-bit S-boxes, reducing intermediate variable usage and effectively enhancing solving efficiency [19].
The equation systems constructed in APFA are in the satisfiability problem (SAT) form that can be solved by off-the-shelf SAT solvers, such as CryptoMiniSAT (CryptoMiniSAT is available open access at https://github.com/msoos/cryptominisat, accessed on 16 October 2024) [20]. The SAT inputs consist of clauses in conjunctive normal form (CNF), where clauses are connected by the conjunction ∧. Each clause comprises literals connected by the disjunction ∨, with each literal being either a positive or negative variable. Additionally, CryptoMiniSAT supports XOR syntax inputs, offering convenience in equation transformation. Previous APFA research describes S-boxes by Tseitin transformation to decompose higher-degree terms into linear combinations. Conjunctive normal form is then used to depict the Boolean relationships of all valid input–output pairs [21]. This approach necessitates numerous intermediate variables to construct data relationships before and after S-boxes [18,19].
Logic Friday, a widely used digital logic design and optimization tool, utilizes the Quine–McCluskey algorithm to simplify Boolean expressions and generate CNF descriptions [22], as well as the Espresso algorithm to simplify its sum-of-products representations [23]. In contrast, the Tseitin transformation introduces auxiliary variables to convert complex Boolean expressions or logic circuits into CNF for SAT solver applications. Studies have shown that CNF clauses generated by Logic Friday exhibit significant advantages in SAT solvers, reducing clause redundancy compared to the traditional Tseitin transformation [24].
Motivations. Prior APFA research overlooked the implications of faulty S-boxes during the key scheduling process. Our investigation reveals that prominent cryptographic standards like AES [25] and PRESENT [1] incorporate S-boxes into their key scheduling algorithms, leveraging the same S-box implementation as the encryption stage. Specifically, Shahbazi et al. [26] and Lu et al. [27] highlight the reuse of the S-boxes in AES, where they are shared between the key scheduling and encryption phases. Similarly, Rolfes et al. [28] and Hanley et al. [29] discuss the shared S-box architecture in the PRESENT cipher, demonstrating its utilization in both key scheduling and encryption processes. This previously unaddressed challenge necessitates a comprehensive extension of APFA to encompass the key scheduling phase. In this paper, we present our investigation and findings on extending algebraic persistent fault analysis to encompass the key scheduling stage of cryptographic algorithms.

Our Contributions

We extend fault injection and analysis to the key scheduling stage, discovering that algebraic persistent fault analysis remains applicable, but find that it comes with two challenges. Firstly, it introduces uncertainty. Deviating from the definition of bijection of S-box, round keys can no longer be traced back to a unique master key, making it difficult to reduce the key search space to a single solution. Secondly, the constructed algebraic equations are larger and more complex, demanding higher solving efficiency. Increasing the depth of fault analysis can reduce uncertainty and consequently shrink the key search space, thus leveraging the first problem. However, increased depth results in larger algebraic equations, necessitating improved solving efficiency to address the second problem. Our main contributions are as follows:
  • Using the 80-bit version of PRESENT as an example, we extend APFA fault injection and analysis to the S-box in the key scheduling stage with compact S-box modeling. Experiments demonstrate that algebraic persistent fault analysis remains applicable when delving into the key scheduling stage. The key search space is difficult to reduce to a single solution; increasing fault analysis depth can shrink the key search space. Experiments show that when the fault analysis encompasses the entire key scheduling and encryption processes, the key search space can approach uniqueness.
  • Since the descriptions of S-boxes account for significant computational resources consumed to solve the SAT problem in APFA, we propose a truth table-based optimization method for S-box modeling. By representing S-boxes with optimized truth tables and utilizing the Logic Friday (version 1.1.4) tool, S-boxes are converted into CNF representation, reducing clause count and eliminating the need for auxiliary variables. Compared to previous construction methods, our algebraic construction significantly enhances solving efficiency in APFA, especially in high-complexity scenarios. For PRESENT, SKINNY, and CRAFT encryption algorithms, the required number of variables and clauses to establish complete algebraic equations is nearly halved, with solving efficiency improved by tens or even hundreds of times. Additionally, we discovered that if solving time is constrained, improved efficiency also translates to higher solving success rates.

2. Background

2.1. Notation Table

Table 1 defines the notations used in this paper.

2.2. Lightweight Block Ciphers in SPN Structure

We use PRESENT [1], SKINNY [3], and CRAFT [5] as our target block ciphers. PRESENT and SKINNY are well-established lightweight algorithms, with PRESENT being the ISO/IEC lightweight block cipher standard [30] and SKINNY being the ISO/IEC tweakable block cipher standard [31]. CRAFT was chosen to establish a new benchmark, as it has not been extensively examined in previous studies. The SPN is an iterative core structure used in block ciphers, achieving encryption strength through alternating nonlinear substitution (Substitution) and linear permutation (Permutation) operations over multiple rounds. A standard SPN structure consists of R iterative rounds, each comprising three core operations:
RoundKey (AK): The round key is XORed with the intermediate state, introducing key dependency.
Substitution Layer (SB): The parallel S-boxes perform nonlinear transformations on fixed-length data blocks. Typically, a 4-bit S-box is used in lightweight block ciphers.
Permutation Layer (PL): The substituted bits are deterministically rearranged to achieve diffusion across S-boxes. Common strategies include the following: (1) ShiftRows: Cyclic shifts by rows (e.g., SKINNY). (2) Bit Permutation: Fixed position mapping (e.g., PRESENT’s 64-bit permutation matrix). (3) MixColumns: Linear transformation based on a finite field (e.g., CRAFT’s 4 × 4 MDS matrix can be implemented using XOR operations).
The typical algorithm structure is F r = P L ( S B ( A K ( X r , K r ) ) ) , 1 r R . Table 2 compares the core parameters of PRESENT, SKINNY, and CRAFT. All three use 4-bit S-boxes, with the specific input–output mappings shown in Table 3. CRAFT’s tweak key ( T K ) is used alongside the master key ( M K ) in key scheduling.
The key scheduling algorithm for PRESENT-80, with a key size of 80 bits, is shown in Algorithm 1.
Algorithm 1 Key schedule of PRESENT-80 [1].
Input: 80-bit master key M K = k 79 k 78 k 0
Output: 64-bit round keys K 1 , K 2 , , K 32
 1: K M K
 2: for r = 1 to 31 do
 3:      K r K [ 79 : 16 ]
 4:      K K 61 ▹ Cyclic left shift by 61 bits
 5:      K [ 79 : 76 ] S ( K [ 79 : 76 ] ) ▹ Substitute the top 4 bits
 6:      K [ 19 : 15 ] K [ 19 : 15 ] bin 5 ( r ) ▹ XOR with 5-bit round counter
 7: end for
 8: K 32 K [ 79 : 16 ]

2.3. Algebraic Persistent Fault Analysis

The construction of APFA [18] algebraic equations should launch multiple encryptions using the same key, as is illustrated in Figure 1. APFA is a ciphertext-only cryptanalysis method, operating as follows:
1.
An attacker injects a small fault into the S-box of an encryption device, affecting the output of one of its mappings and rendering the S-box’s mapping unbalanced. The faulty S-box ( S ) persists through multiple encryption rounds. The fault information in S includes the fault location (l) and fault value (f), where S [ l ] = S [ l ] f .
2.
The victim encrypts multiple plaintexts using a fixed key on the faulty encryption device.
3.
The attacker collects ciphertexts containing fault information and establishes a system of algebraic equations based on the relationship between the key, encryption process, and fault information of the S-box.
4.
SAT solving tools are used to solve the equations. If successful, the solution reveals the master key.
For the faulty S-box S , assume the fault occurs at S [ l ] (fault location l, i.e., the l-th byte of S), causing S [ l ] = U to become S [ l ] = V . Consequently, for each round’s S B , it holds that S [ X i r ] U . This inequality is represented by CNF in Equations (1) and (2), where d ( j ) means the j-th bit of d. Since d ( j ) s can not be 0 simultaneously, there must be at least one bit d i that is not zero, indicating that S [ X i r ] U .
d ( j ) S [ X i r ] ( j ) U ( j ) = 0 , 0 j < w
d ( 0 ) d ( 1 ) d ( w 1 ) = 1

3. Extending APFA to the Key Scheduling Phase

In this section, we explore the effects of extending the faulty S-box to the key scheduling phase. Our experiments and analyses confirm that APFA remains effective when fault injection and analysis are extended to the key scheduling process.

3.1. Implementation with Shared S-Box

When translating encryption algorithms from theory to practice, circuit implementations vary according to specific requirements. If throughput is prioritized, designs may consider executing the same operations in parallel, such as replicating S-boxes to allow parallel data processing through multiple S-boxes, thus enhancing efficiency. Conversely, to minimize the area of implementation circuits, reducing the number of implemented S-boxes is a viable approach. In circuit implementations of encryption devices, a single instance of an S-box may suffice, reducing circuit scale, with all related data passing through the S-box sequentially. Designs for AES [26,27] and PRESENT [28,29,32] reflect such considerations.
Practical circuits balance throughput and area based on requirements. For the PRESENT encryption algorithm’s implementation, we assume a single S-box instance is used, with the key scheduling and encryption phases serially utilizing this S-box. A simplified representation of the data flow in its serial circuit construction is shown in Figure 2, where r denotes the current round.
Focusing on the PRESENT encryption algorithm, where the key scheduling process requires the same S-box as used in encryption, we extend APFA fault injection to the key scheduling phase, assuming only one S-box instance in the circuit. Fault injection into the S-box affects both the encryption and key scheduling SB operations.
The use of a faulty S-box in the key scheduling phase significantly increases the scale and complexity of the algebraic system. We propose a new algebraic construction method for the S-box that greatly improves solving efficiency. Due to the structure of this paper, the introduction and effects of this method are discussed in Section 4.2 and Section 5, respectively.
Our primary focus is on the feasibility of extending APFA to the key scheduling phase. Given the superior performance of our algebraic construction method, this section discusses extending APFA to the key scheduling phase using our proposed S-box modeling method exclusively.

3.2. Experimental Setup

We assume the key scheduling and encryption processes use the same faulty S-box instance. For the PRESENT encryption algorithm, we inject a 1-bit fault at location l = 0 with a fault value of f = 0 x 0001 . As a result, the faulty S-box value becomes S [ 0 ] = 0 x d , (whereas the original value is S [ 0 ] = 0 x c ). Compared to the initial APFA, extending to the key scheduling phase requires reflecting the S-box fault information during key scheduling. The complete process is detailed in Algorithm 2.
Algorithm 2 APFA on 80-bit PRESENT (key schedule using faulty S-box).
Input:  C , l , f , N r
Output:  M K ▹ Output: Recovered master key
 1: U S [ l ] ▹ Store original S-box value
 2: S [ l ] S [ l ] f ▹ Inject fault at S-box position l
 3: for  r 0 ; r < R ; r + + do
 4:      g e n K e y S c h e d u l e C o n s t r a i n t s ( r , K r ) ▹ Normal key scheduling constraints
 5:      g e n K e y S c h e d u l e F a u l t C o n s t r a i n t s ( r , K r , U ) ▹ Faulty S-box constraints
 6: end for
 7: for C C do
 8:     for  r R N r ; r R ; r + + do▹ Analyze the last N r encryption rounds
 9:            g e n S B o x C o n s t r a i n t s ( X r ) ▹ S-box substitution constraints
 10:          g e n F a u l t S B o x C o n s t r a i n t s ( X r , U ) ▹ Faulty S-box constraints
 11:          g e n P e r m u t a t i o n L a y e r C o n s t r a i n t s ( X r ) ▹ Permutation layer constraints
 12:          g e n A d d R o u n d K e y C o n s t r a i n t s ( X r )
 13:     end for
 14:      X R C ▹ Bind ciphertext to final state
 15: end for
 16: M K R u n A P F A S o l v e r ( ) ▹ Invoke solver to recover key
Here, “genKeyScheduleFaultConstraints” and “genFaultSBoxConstraints” represent constraints related to the faulty S-box during key scheduling and encryption, respectively, i.e., S [ X ] U .
Extending APFA to the key scheduling phase, the algebraic equation system includes the following constraints:
  • Multiple encryptions use the same key.
  • Constraints of the key scheduling process (using the faulty S-box). Since multiple encryptions use the same key, this constraint needs to be added only once.
  • Constraints of the encryption process (using the faulty S-box).
  • Additional constraints on the faulty S-box (the mapped value of the original S-box at the fault location S [ l ] cannot appear in the data output through the faulty S-box, i.e., S [ l ] S [ l ] ). This additional constraint must be added whenever data pass through a faulty S-box.

3.3. Results with Faulty S-Box in Key Schedule

In our experiments, we simulated fault injection using software and employed CryptoMiniSAT v5.11.22 as the SAT solver to resolve algebraic equations. For fairness, we configured the solver to execute in a single-threaded mode. The experiments were conducted on a PC equipped with 32 GB of memory and a 3.5 GHz Intel(R) Core(TM) i5-13600KF CPU (Intel Corporation, Santa Clara, CA, USA), utilizing an Ubuntu 24.04.4 virtual machine (Canonical Ltd., London, UK). The virtual machine was allocated 16 GB of memory and 8 processors.
To best simulate real-world conditions, all timing statistics were measured using randomly generated sets of required faulty ciphertexts for each APFA experiment. Each experiment was repeated more than 10 times, with the maximum and minimum values discarded and the average of the remaining results taken as the final value. For N v and N e , their values remain the same under identical experimental conditions and can be directly obtained from the program.
In our experiments, we considered a ciphertext quantity of ( N C = 30 ) as a parameter that balances complexity and solving rate. We set out to use 30 faulty ciphertexts for our analysis. We measured the size of the master key search space after solving. As the depth of fault analysis increased from 5 to all encryption rounds, the average number of master key search space solutions obtained is shown in Figure 3. As the fault depth increases, the size of the master key search space decreases. When fault analysis covers the entire encryption and key scheduling process, the key search space approaches uniqueness.
Since APFA is a ciphertext-only cryptanalysis method, it focuses solely on the last few rounds (equivalent to the fault analysis depth) of the encryption process. When constructing the system of algebraic equations, we include all key scheduling processes and the constraint equations corresponding to the last few rounds of encryption. Assuming a fault analysis depth of N r , if no faults exist in the key scheduling process, the round key for the ( R N r + 1 ) -th round, K R N r + 1 , can be deduced uniquely and the unique master key ( K 1 ) can be recovered accordingly.
However, if faults are injected and the analysis is extended to the key scheduling process, uncertainty is also introduced into this process. Consequently, we are unable to make the search space for K R N r + 1 converge, which further complicates reducing the search space for the master key to a single solution. The inability for candidate key convergence under certain fault conditions is acknowledged, and we constructively address this limitation by extending the analysis depth.
Since the rules of key scheduling are deterministic, increasing the depth of fault analysis allows for a more in-depth examination, gradually eliminating the interference caused by faulty S-boxes. This deeper analysis is crucial for effectively locking in the correct key candidates, thereby enhancing the practical applicability of APFA. Ultimately, when N r = R , meaning the fault analysis covers the entire key scheduling and encryption processes, the search space for the master key is reduced to approach uniqueness.
It still remains difficult to fully converge because, for the first S-box encountered in the key scheduling process, resolving its fault information requires the ciphertext to provide sufficient data that can collide with the fault of that S-box. This necessitates a high number of ciphertexts, and the potential benefit may only shift the key search space from being nearly unique to uniquely identifying the key, resulting in an imbalance between the effort required and the gains achieved.

4. Algebraic Construction of the S-Box

The solving efficiency of APFA is influenced by the scale of the algebraic equation system. In constructing the algebraic system, addition operations can be directly represented using XOR, while permutation operations are realized through variable mapping. The core challenge lies in the algebraic representation of the S-box, as its complexity directly impacts the processing efficiency of the SAT solver [20]. This section introduces a novel method for S-box construction, with its innovation highlighted in Section 4.2.

4.1. Classical ANF-CNF Conversion Method

The classical approach models the S-box by converting Algebraic Normal Form (ANF) to CNF. Taking the 4-bit S-box used in PRESENT as an example, assume X i = ( x 0 , x 1 , , x w 1 ) and Y i = ( y 0 , y 1 , , y w 1 ) are the S-box input and output, respectively. The ANF representation of the S-box is expressed in Equation (3) [18]. The AND operation is denoted by “·”, which may be omitted.
y 0 = x 0 x 2 x 3 x 1 x 2 y 1 = x 1 x 3 x 1 x 3 x 2 x 3 x 0 x 1 x 2 x 0 x 1 x 3 x 0 x 2 x 3 y 2 = 1 x 2 x 3 x 0 x 1 x 0 x 3 x 1 x 3 x 0 x 1 x 3 x 0 x 2 x 3 y 3 = 1 x 0 x 1 x 3 x 1 x 2 x 0 x 1 x 2 x 0 x 1 x 3 x 0 x 2 x 3
Each nonlinear term x 0 x 1 x w 1 requires the introduction of an intermediate variable I t , establishing constraints as shown in Equation (4) [18]. Each term can be considered an independent CNF clause.
( x 0 I ¯ t ) ( x 1 I ¯ t ) ( x w 1 I ¯ t ) ( x ¯ 0 x ¯ 1 x ¯ w 1 I t ) = 1
For an S-box with n nonlinear terms, O ( n ) intermediate variables and O ( n ) CNF clauses are required. The original S-box in the PRESENT encryption algorithm requires 8 intermediate variables and 28 clauses for representation.
Assume a 1-bit fault is injected into the S-box at fault location l = 0 with fault value f = 0 x 0001 . Its algebraic representation requires 11 intermediate variables and 43 clauses.
While this method accurately models the S-box, the introduction of intermediate variables significantly increases the problem’s dimensionality, leading to a substantial expansion of the SAT solving space.

4.2. Truth Table-Based Optimized S-Box Modeling Method

We propose a direct modeling method based on truth table optimization. Let the S-box input be X = ( x 0 , , x w 1 ) and output Y = ( y 0 , , y w 1 ) . Define a boolean function P : { 0 , 1 } w × { 0 , 1 } w { 0 , 1 } , as shown in Equation (5).
P ( X , Y ) = 1 if Y = S ( X ) 0 otherwise
For a given faulty S-box, convert it into a truth table of a Boolean function, where possible patterns have a value of 1 and impossible patterns have a value of 0. This truth table is input into the Logic Friday software. This truth table is input into the Logic Friday software to generate and simplify the CNF representation.
For the PRESENT encryption algorithm, using the faulty S-box S [ 0 ] = 0 x d (note that originally S [ 0 ] = 0 x c ), the truth table input to the Logic Friday tool is shown in Table 4.
After data transformation and reduction by the tool, the resulting CNF data are shown in Figure 4, where the “Minimized Product of Sums” represents the required CNF data.
This algebraic construction method for the S-box does not require the introduction of additional auxiliary variables, and the results can be directly viewed as conforming to the format required by SAT solvers such as CryptoMiniSAT.
A comparison of the number of variables and clauses required for different S-box modeling methods is shown in Table 5. For the faulty S-box, we uniformly assume a 1-bit fault is injected at location l = 0 with fault value f = 0 x 0001 .

5. APFA with Compact S-Box Modeling

We applied APFA to the PRESENT, SKINNY, and CRAFT encryption algorithms, utilizing our algebraic representation of the S-box and comparing it to the traditional method. For the faulty S-box used in the encryption process, we assumed a 1-bit fault was injected at fault location l = 0 with fault value f = 0 x 0001 .
For consistency, we used the same experimental environment as described in Section 3.3.

5.1. APFA on PRESENT

We assumed that the S-boxes used in the key scheduling and encryption phases of PRESENT reside in different memory units, with only the S-box in the encryption phase being faulty. The S-box used in the encryption phase has a single instance, through which all data are processed sequentially.
We implemented APFA on both the 80-bit and 128-bit versions of the PRESENT encryption algorithm. For the S-box, we employed two different algebraic construction methods.
Using our S-box algebraic construction method, the number of variables and clauses required to construct the complete algebraic expression is significantly reduced under different fault analysis depths and numbers of faulty ciphertexts. For the 80-bit version of PRESENT, we set parameters N r [ 5 , 12 ] , N c = 30 . The comparison with the original APFA is shown in Table 6.
For the 128-bit version, we set parameters N r [ 5 , 12 ] , N c = 80 . The comparison with the original APFA is shown in Table 7.
We consider these parameters representative. In experiments, both S-box construction methods with these parameters can solve successfully in a relatively short time, facilitating comparison.
Our algebraic representation significantly reduces the solving time for APFA, and as N r increases, the advantage becomes more pronounced due to the expanding scale of the algebraic system.

5.2. APFA on SKINNY-64

We conducted APFA on three versions of the SKINNY-64 encryption algorithm. When the key length is 64 bits, both the original and our S-box construction methods successfully solve in a short time. For key lengths of 128 and 192 bits, due to our computational resource limitations, the original S-box construction method’s solving efficiency becomes highly unstable, often failing to solve within 24 hours. We only perform comparisons on SKINNY-64-64.
Using our S-box algebraic construction method, for a key length of 64 bits, we set parameters N r [ 5 , 12 ] , N c = 20 . The comparison with the original APFA is shown in Table 8.
Using our S-box algebraic construction method, we set the parameters as follows: for a key length of 128 bits, N r [ 7 , 12 ] and N c = 120 ; for a key length of 192 bits, N r [ 8 , 12 ] and N c = 300 . The algebraic construction and the average solving time are detailed in Table 9. For a key length of 192 bits, when N r is set to 7, the key can always converge to a single-digit value, but it does not consistently converge to a unique value.

5.3. APFA on CRAFT

CRAFT uses a 128-bit key and a 64-bit tweak to generate four 64-bit round keys, which are cycled through during encryption. The key information is obfuscated by the tweak key; thus, multiple possible keys exist, with the correct key among them. Alternatively, we can recover the total 256-bit round key, which is determinable, but multiple combinations of master key and tweak key can produce this round key.
We do not consider finding a unique solution as the termination condition. In the experiment, we increase N c or N r as much as possible, ultimately reducing the key search space to 16, marking this as a successful solution.
For the CRAFT encryption algorithm, we set the parameters N r [ 5 , 12 ] and N c = 80 . The comparison with the original APFA is shown in Table 10. When N r reaches 11, using the original construction of the S-box, we are unable to find a solution within 5 days.

5.4. Exploration with Limited Solving Time

In practice, due to limitations in computing resources, we often cannot invest unlimited time in automated analysis. Typically, a maximum time is set, and if unsolved within this timeframe, it is considered a failure.
We set the SAT solver’s solving time to 3600 s and conducted APFA on both versions of PRESENT. We gradually increased the fault analysis depth and recorded the number of ciphertexts required for successful solving within the time limit. The results are shown in Figure 5 and Figure 6.
Under the time constraint, it can be observed that as the fault analysis depth increases, the number of ciphertexts required for solving using the original S-box construction method tends to rise. In contrast, using our model to construct the S-box, the number of ciphertexts required remains stable.
At the same fault analysis depth, based on the principle of Boolean function equivalence, the algebraic properties of different S-box construction methods are essentially the same, as both describe the S-box [33]. Theoretically, as the fault analysis depth increases, due to deeper analysis, the number of faulty ciphertexts required for successful solving using both S-box construction methods should decrease or remain stable, but should not rise.
With a constraint on solving time, aiming for a unique solution, an increase in faulty ciphertexts also means an increase in known conditions, which can improve solving efficiency and success rate. An increase in fault depth represents deeper exploration of faulty ciphertext information, which can also improve solving efficiency and success rate to some extent. However, both an increase in faulty ciphertexts and fault analysis depth lead to an increase in equation scale, requiring the solver to spend more time handling additional algebraic equations. These equations may not be necessary for successful solving, but the solver still needs to invest resources to verify them to ensure the results are not refuted by this information.
An increase in faulty ciphertexts has a linear impact on known conditions and equation scale. An increase in fault analysis depth has a linear impact on deep information exploration, but an exponential impact on equation scale. Each increase in fault analysis depth multiplies the complexity of the equation scale. Therefore, we believe there is a critical value for the impact of fault analysis depth on solving time. When the fault analysis depth is less than this value, an increase in depth means more efficient use of faulty ciphertexts, improving the success rate within the time limit, which is our main focus; when the depth exceeds this value, we focus more on the increase in solving time it brings.
Due to the relatively complex algebraic construction of the S-box in the original model, the problem scale becomes too large to solve within a limited time, necessitating an increase in ciphertext quantity to provide more “cost-effective” valid information. Using our S-box model, its algebraic construction is more conducive to the SAT solver extracting the key information contained within, and the critical value of fault analysis depth is much higher than that of the original S-box model, thus performing better in higher complexity scenarios.

6. Conclusions

In this paper, we validated the feasibility of extending APFA fault injection and analysis to the key scheduling phase. Injecting faults into the key scheduling process presents challenges for cryptanalysis, making it difficult to recover the correct key. In such cases, increasing the depth of fault analysis can reduce the search space for the master key. For the 80-bit version of the PRESENT encryption algorithm, using 30 faulty ciphertexts in our experiments, we observed that as the fault analysis depth increased, the key search space decreased. When fault analysis covered the entire encryption process, the key search space converged to near uniqueness.
We proposed an optimized algebraic representation for S-boxes in APFA, utilizing a truth table-based optimized S-box modeling method that eliminates the need for auxiliary variables and offers superior performance. We implemented this improvement across various SPN-based block ciphers, achieving significant enhancements in APFA solving efficiency, with improvements ranging from tens to hundreds of times, and better adaptability to high-complexity scenarios.
This work highlights the potential of our improved algebraic persistent fault analysis (APFA) method in enhancing the applicability and efficiency of fault-based cryptanalysis, especially when fault injection is extended to the key scheduling phase.

Future Work

In practice, using multiple identical S-boxes in parallel to increase throughput is a common practice. Moreover, some cryptographic algorithms, such as AES, employ larger S-boxes (e.g., 8-bit S-boxes) rather than 4-bit ones. Furthermore, S-boxes can also be constructed using logic gates instead of lookup tables, which poses new challenges for the algebraic representation of the S-box.
Future research can further explore the application of APFA under different cryptographic algorithms, circuit implementations, and fault models. The compact S-box modeling method proposed in this paper aligns well with differential fault analysis (DFA), as both approaches involve constructing equations to analyze cryptographic vulnerabilities. By applying our compact S-box modeling technique within the DFA framework, we may gather more information to effectively reduce the key space. This integration of techniques, such as DFA, could lead to a more effective utilization of faults in cryptographic systems.
Moreover, future research can investigate the application of APFA to post-quantum cryptographic algorithms, such as Kyber, particularly focusing on their compact implementations in lightweight devices [34]. Furthermore, the examination of implementation security in post-quantum cryptography is an emerging area of interest [35], where APFA could play a important role.

Author Contributions

Conceptualization, K.Q. and H.L.; methodology, H.L.; software, H.L.; validation, H.L., Y.X., C.O. and A.W.; formal analysis, H.L.; investigation, C.O.; resources, K.Q.; data curation, H.L.; writing—original draft preparation, H.L.; writing—review and editing, K.Q.; visualization, Y.X.; supervision, A.W.; project administration, K.Q.; funding acquisition, K.Q. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Cryptologic Science Fund of China (No. 2025NCSF02011), the National Natural Science Foundation of China (62102025), the Beijing Natural Science Foundation (4222035), and the Beijing Institute of Technology Research Fund Program for Young Scholars (XSQD-202024003).

Data Availability Statement

To facilitate further exploration by researchers and developers, we have hosted the relevant code in the following link: https://github.com/Hanbing0734/APFA-Implementation-Improvement.git, accessed on 20 March 2025.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the study design, data collection, analysis and interpretation, manuscript writing, and decision to publish results.

Abbreviations

The following abbreviations are used in this manuscript:
APFAAlgebraic persistent fault analysis
FAFault analysis
DFADifferential fault analysis
AFAAlgebraic fault analysis
PFAPersistent fault analysis
SPNSubstitution–Permutation Network
ROMRead-Only Memory
SATSatisfiability problem
CNFConjunctive normal form
AKAdd RoundKey
SBSubstitution layer
PLPermutation layer
TKTweak key
MKMaster key
ANFAlgebraic Normal Form

References

  1. Bogdanov, A.; Knudsen, L.R.; Leander, G.; Paar, C.; Poschmann, A.; Robshaw, M.J.; Seurin, Y.; Vikkelsoe, C. PRESENT: An ultra-lightweight block cipher. In Proceedings of the Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop, Vienna, Austria, 10–13 September 2007; Proceedings 9. Springer: Berlin, Germany, 2007; pp. 450–466. [Google Scholar]
  2. Banik, S.; Pandey, S.K.; Peyrin, T.; Sasaki, Y.; Sim, S.M.; Todo, Y. GIFT: A small present: Towards reaching the limit of lightweight encryption. In Proceedings of the Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International Conference, Taipei, Taiwan, 25–28 September 2017; Proceedings. Springer: Berlin, Germany, 2017; pp. 321–345. [Google Scholar]
  3. Beierle, C.; Jean, J.; Kölbl, S.; Leander, G.; Moradi, A.; Peyrin, T.; Sasaki, Y.; Sasdrich, P.; Sim, S.M. The SKINNY family of block ciphers and its low-latency variant MANTIS. In Proceedings of the Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2016; Proceedings, Part II 36. Springer: Berlin, Germany, 2016; pp. 123–153. [Google Scholar]
  4. Guo, J.; Peyrin, T.; Poschmann, A.; Robshaw, M. The LED block cipher. In Proceedings of the Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International Workshop, Nara, Japan, 28 September–1 October 2011; Proceedings 13. Springer: Berlin, Germany, 2011; pp. 326–341. [Google Scholar]
  5. Beierle, C.; Leander, G.; Moradi, A.; Rasoolzadeh, S. CRAFT: Lightweight tweakable block cipher with efficient protection against DFA attacks. IACR Trans. Symmetric Cryptol. 2019, 2019, 5–45. [Google Scholar] [CrossRef]
  6. Joye, M.; Tunstall, M. (Eds.) Fault Analysis in Cryptography; Springer: Berlin, Germany, 2012; Volume 147. [Google Scholar]
  7. Barenghi, A.; Bertoni, G.M.; Breveglieri, L.; Pelosi, G. A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. J. Syst. Softw. 2013, 86, 1864–1878. [Google Scholar] [CrossRef]
  8. Aumüller, C.; Bier, P.; Fischer, W.; Hofreiter, P.; Seifert, J.P. Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In Proceedings of the Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, 13–15 August 2002; Revised Papers 4. Springer: Berlin, Germany, 2003; pp. 260–275. [Google Scholar]
  9. Hutter, M.; Schmidt, J.M. The temperature side channel and heating fault attacks. In Proceedings of the Smart Card Research and Advanced Applications: 12th International Conference, CARDIS 2013, Berlin, Germany, 27–29 November 2013; Revised Selected Papers 12. Springer: Berlin, Germany, 2014; pp. 219–235. [Google Scholar]
  10. Skorobogatov, S.P.; Anderson, R.J. Optical fault induction attacks. In Proceedings of the Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International Workshop Redwood Shores, CA, USA, 13–15 August 2002; Revised Papers 4. Springer: Berlin, Germany, 2003; pp. 2–12. [Google Scholar]
  11. Grandamme, P.; Tissot, P.A.; Bossuet, L.; Dutertre, J.M.; Colombier, B.; Grosso, V. Switching off your device does not protect against fault attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024, 2024, 425–450. [Google Scholar] [CrossRef]
  12. Wagner, M.; Heyse, S. Single–Trace Template Attack on the DES Round Keys of a Recent Smart Card. Cryptol. ePrint Arch. 2017, 2017, 1–40. [Google Scholar]
  13. Biham, E.; Shamir, A. Differential fault analysis of secret key cryptosystems. In Proceedings of the Advances in Cryptology—CRYPTO’97: 17th Annual International Cryptology Conference, Santa Barbara, CA, USA, 17–21 August 1997; Proceedings 17. Springer: Berlin, Germany, 1997; pp. 513–525. [Google Scholar]
  14. Courtois, N.T.; Jackson, K.; Ware, D. Fault-algebraic attacks on inner rounds of DES. In Proceedings of the E-Smart’10 Proceedings: The Future of Digital Security Technologies, Strategies Telecom and Multimedia, Valbonne, French, 22–24 September 2010. [Google Scholar]
  15. Zhang, F.; Lou, X.; Zhao, X.; Bhasin, S.; He, W.; Ding, R.; Qureshi, S.; Ren, K. Persistent fault analysis on block ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018, 2018, 150–172. [Google Scholar] [CrossRef]
  16. Zhang, F.; Zhang, Y.; Jiang, H.; Zhu, X.; Bhasin, S.; Zhao, X.; Liu, Z.; Gu, D.; Ren, K. Persistent fault attack in practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020, 2020, 172–195. [Google Scholar] [CrossRef]
  17. Nguyen, V.S.; Grosso, V.; Cayrel, P.L. Practical persistent fault attacks on AES with instruction skip. IACR Commun. Cryptol. 2025, 2, 1–20. [Google Scholar] [CrossRef]
  18. Zhang, F.; Feng, T.; Li, Z.; Ren, K.; Zhao, X. Free fault leakages for deep exploitation: Algebraic persistent fault analysis on lightweight block ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022, 2022, 289–311. [Google Scholar] [CrossRef]
  19. Fang, X.; Zhang, H.; Wang, D.; Yan, H.; Fan, F.; Shu, L. Algebraic persistent fault analysis of SKINNY_64 based on s_box decomposition. Entropy 2022, 24, 1508. [Google Scholar] [CrossRef] [PubMed]
  20. Soos, M.; Nohl, K.; Castelluccia, C. Extending SAT solvers to cryptographic problems. In Proceedings of the International Conference on Theory and Applications of Satisfiability Testing, Swansea, UK, 30 June–3 July 2009; Springer: Berlin, Germany, 2009; pp. 244–257. [Google Scholar]
  21. Knudsen, L.R.; Miolane, C.V. Counting equations in algebraic attacks on block ciphers. Int. J. Inf. Secur. 2010, 9, 127–135. [Google Scholar] [CrossRef]
  22. Quine, W.V. The problem of simplifying truth functions. Am. Math. Mon. 1952, 59, 521–531. [Google Scholar] [CrossRef]
  23. Brayton, R.K.; Hachtel, G.D.; McMullen, C.; Sangiovanni-Vincentelli, A. Logic Minimization Algorithms for VLSI Synthesis; Springer Science & Business Media: Berlin, Germany, 1984; Volume 2. [Google Scholar]
  24. Hu, X.; Xu, S.; Tu, Y.; Feng, X. CNF characterization of sets over Z2n and its applications in cryptography. Cryptol. ePrint Arch. 2023, 2023, 1–21. [Google Scholar]
  25. Daemen, J.; Rijmen, V. The Design of Rijndael; Springer: Berlin, Germany, 2002; Volume 2. [Google Scholar]
  26. Shahbazi, K.; Ko, S.B. Area-efficient nano-AES implementation for Internet-of-Things devices. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2020, 29, 136–148. [Google Scholar] [CrossRef]
  27. Lu, M.; Fan, A.; Xu, J.; Shan, W. A compact, lightweight and low-cost 8-bit datapath AES circuit for IOT applications in 28nm CMOS. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 1464–1469. [Google Scholar]
  28. Rolfes, C.; Poschmann, A.; Leander, G.; Paar, C. Ultra-lightweight implementations for smart devices–security for 1000 gate equivalents. In Proceedings of the Smart Card Research and Advanced Applications: 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, 8–11 September 2008; Proceedings 8. Springer: Berlin, Germany, 2008; pp. 89–103. [Google Scholar]
  29. Hanley, N.; ONeill, M. Hardware comparison of the ISO/IEC 29192-2 block ciphers. In Proceedings of the 2012 IEEE Computer Society Annual Symposium on VLSI, Amherst, MA, USA, 19–21 August 2012; pp. 57–62. [Google Scholar]
  30. ISO/IEC 29192-2:2019; Information Security—Lightweight Cryptography—Part 2: Block Ciphers. ISO: Geneva, Switzerland, 2019.
  31. ISO/IEC 18033-7:2022; Information Security—Encryption Algorithms—Part 7: Format-Preserving Encryption. ISO: Geneva, Switzerland, 2022.
  32. Tay, J.; Wong, M.D.; Wong, M.; Zhang, C.; Hijazin, I. Compact FPGA implementation of PRESENT with boolean s-box. In Proceedings of the 2015 6th Asia Symposium on Quality Electronic Design (ASQED), Penang, Malaysia, 4–5 August 2015; pp. 144–148. [Google Scholar]
  33. Zelewski, S. Komplexitätstheorie: Als Instrument zur Klassifizierung und Beurteilung von Problemen des Operations Research; Springer: Berlin, Germany, 2013. [Google Scholar]
  34. Sanal, P.; Karagoz, E.; Seo, H.; Azarderakhsh, R.; Mozaffari-Kermani, M. Kyber on ARM64: Compact implementations of Kyber on 64-bit ARM Cortex-A processors. In Proceedings of the International Conference on Security and Privacy in Communication Systems, Virtual, 6–9 September 2021; Springer: Berlin, Germany, 2021; pp. 424–440. [Google Scholar]
  35. Canto, A.C.; Kaur, J.; Kermani, M.M.; Azarderakhsh, R. Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security. arXiv 2023, arXiv:2305.13544. [Google Scholar]
Figure 1. The relationship among the encryption process, key, S-box, and ciphertext.
Figure 1. The relationship among the encryption process, key, S-box, and ciphertext.
Cryptography 09 00030 g001
Figure 2. Data path of PRESENT encryption circuit (unique S-box).
Figure 2. Data path of PRESENT encryption circuit (unique S-box).
Cryptography 09 00030 g002
Figure 3. Reduction in master key search space with increasing fault analysis depth.
Figure 3. Reduction in master key search space with increasing fault analysis depth.
Cryptography 09 00030 g003
Figure 4. CNF results for PRESENT’s faulty S-box generated by Logic Friday.
Figure 4. CNF results for PRESENT’s faulty S-box generated by Logic Friday.
Cryptography 09 00030 g004
Figure 5. Number of ciphertexts required for solving PRESENT-80 (max solution time = 3600 s).
Figure 5. Number of ciphertexts required for solving PRESENT-80 (max solution time = 3600 s).
Cryptography 09 00030 g005
Figure 6. Number of ciphertexts required for solving PRESENT-128 (max solution time = 3600 s).
Figure 6. Number of ciphertexts required for solving PRESENT-128 (max solution time = 3600 s).
Cryptography 09 00030 g006
Table 1. Notations used in this paper.
Table 1. Notations used in this paper.
NotationsDefinitionsNotationsDefinitions
nThe block size S The faulty S-box
wThe size of S-boxlThe fault location in the faulty S-box
rThe round indexfThe fault value in the faulty S-box
RThe total number of roundsU S [ l ]
X r The r-th round data blockV S [ l ] f , i.e., S [ l ]
X i r The i-th element of X r N c The number of ciphertexts
K r The r-th round key N r The depth of fault leakages
CThe ciphertext N v The total number of variables
FThe round function N e The total number of equations
SThe S-box N k Size of the key search space
Table 2. Comparison of algorithm parameters.
Table 2. Comparison of algorithm parameters.
PropertyPRESENT [1]SKINNY-64 [3]CRAFT [5]
Block length (bit)646464
Master key length (bit)80/12864/128/192128
Number of rounds3132/36/4032
S-box width4-bit4-bit4-bit
Key scheduling S-boxReuse encryption S-box--
Table 3. S-box definitions.
Table 3. S-box definitions.
X0123456789abcdef
S[X]-PRESENTc56b90ad3ef84712
S[X]-SKINNYc6901a2b385d4e7f
S[X]-CRAFTcad3ebf789150246
Table 4. Truth table of the boolean function constructed from a faulty S-box.
Table 4. Truth table of the boolean function constructed from a faulty S-box.
x 3 x 2 x 1 x 0 y 3 y 2 y 1 y 0 Prob
000011011
000101011
001001101
001110111
010010011
010100001
011010101
011111011
100000111
100111101
101011111
101110001
110001001
110101111
111000011
111100101
Table 5. Comparison of variable and clause requirements for different S-box construction methods.
Table 5. Comparison of variable and clause requirements for different S-box construction methods.
AlgorithmS-BoxTraditional MethodProposed Method
Intermediate Variables Clauses Intermediate Variables Clauses
PRESENTOriginal831-26
Faulty1143-27
SKINNYOriginal830-22
Faulty833-23
CRAFTOriginal831-22
Faulty1143-22
Table 6. APFA on PRESENT-80 with compact S-box modeling.
Table 6. APFA on PRESENT-80 with compact S-box modeling.
N r N c N v N e Time ( s )
New Origin Ratio New Origin Ratio New Origin Ratio
53027,16448,53256.0%73,846104,72170.6%2.5555.374.6%
63032,92459,57255.3%91,126129,68170.4%3.64105.23.5%
73038,68470,61254.7%108,406154,64170.1%3.78127.152.9%
83044,44481,65254.4%125,686179,60170.0%3.90151.582.6%
93050,20492,69254.2%142,966204,56170.0%4.39272.031.6%
103055,964103,73253.9%160,246229,52169.8%6.73262.092.6%
113061,724114,77253.8%177,526254,48169.8%7.85387.342.0%
123067,484125,81253.6%194,806279,44169.7%9.10423.072.2%
Table 7. APFA on PRESENT-128 with compact S-box modeling.
Table 7. APFA on PRESENT-128 with compact S-box modeling.
N r N c N v N e Time ( s )
New Origin Ratio New Origin Ratio New Origin Ratio
58072,136128,95256.0%196,252278,48270.5%9.8162.0615.8%
68087,496158,39255.2%242,332345,04270.2%13.31120.1211.1%
780102,856187,83254.8%288,412411,60270.1%14.26228.936.2%
880118,216217,27254.4%334,492478,16269.9%19.22390.374.9%
980133,576246,71254.1%380,572544,72269.9%27.28671.984.1%
1080148,936276,15253.9%426,652611,28269.8%29.34691.834.2%
1180164,296305,59253.8%472,732677,84269.7%26.251051.612.5%
1280179,656335,03253.6%518,812744,40269.7%26.411682.771.6%
Table 8. APFA on SKINNY-64-64 with compact S-box modeling.
Table 8. APFA on SKINNY-64-64 with compact S-box modeling.
N r N c N v N e Time ( s )
New Origin Ratio New Origin Ratio New Origin Ratio
52023,60836,40864.8%55,54471,54477.7%1.7027.836.1%
62027,82843,18864.4%66,16485,36477.5%3.8747.868.1%
72032,02849,94864.1%76,76499,16477.4%6.03101.355.9%
82036,24856,72863.9%87,384112,98477.3%7.69186.414.1%
92040,46863,50863.7%98,004126,80477.3%8.03293.412.7%
102044,68870,28863.6%108,624140,62477.3%10.76623.491.7%
112048,9287708863.5%119,264154,46477.2%11.551054.141.1%
122053,16883,88863.4%129,904168,30477.2%11.781277.210.9%
Table 9. APFA on SKINNY-64-128/192 with compact S-box modeling.
Table 9. APFA on SKINNY-64-128/192 with compact S-box modeling.
Key Lengths N r N c N v N e Time ( s )
1287120187,320455,99222.67
8120212,880519,95230.52
9120238,320583,79241.39
10120263,640647,51267.19
11120288,840711,11279.31
12120314,160774,832111.38
1928300530,6961,298,504186.55
9300594,2961,458,104453.96
10300657,8961,617,704678.18
11300721,7961,777,6041015.61
12300785,6961,937,5041451.63
Table 10. APFA on CRAFT with compact S-box modeling.
Table 10. APFA on CRAFT with compact S-box modeling.
N r N c N v N e Time ( s )
New Origin Ratio New Origin Ratio New Origin Ratio
58086,368142,68860.6%183,456290,97663.0%29.45557.765.3%
680104,768175,16859.8%226,176360,57662.7%52.681339.343.9%
780123,088207,56859.3%268,816430,09662.5%84.422349.013.6%
880141,328239,88859.0%311,376499,53662.3%189.3110,393.151.8%
980159,488272,12858.6%353,856568,89662.2%291.7781,903.380.4%
1080177,728304,44858.4%396,416638,33662.1%132.69124,123.620.1%
1180195,888336,68858.2%438,896707,69662.0%481.63//
1280214,128369,00858.0%481,456777,13662.0%1026.81//
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, H.; Qiao, K.; Xu, Y.; Ou, C.; Wang, A. General Extensions and Improvements of Algebraic Persistent Fault Analysis. Cryptography 2025, 9, 30. https://doi.org/10.3390/cryptography9020030

AMA Style

Li H, Qiao K, Xu Y, Ou C, Wang A. General Extensions and Improvements of Algebraic Persistent Fault Analysis. Cryptography. 2025; 9(2):30. https://doi.org/10.3390/cryptography9020030

Chicago/Turabian Style

Li, Hanbing, Kexin Qiao, Ye Xu, Changhai Ou, and An Wang. 2025. "General Extensions and Improvements of Algebraic Persistent Fault Analysis" Cryptography 9, no. 2: 30. https://doi.org/10.3390/cryptography9020030

APA Style

Li, H., Qiao, K., Xu, Y., Ou, C., & Wang, A. (2025). General Extensions and Improvements of Algebraic Persistent Fault Analysis. Cryptography, 9(2), 30. https://doi.org/10.3390/cryptography9020030

Article Metrics

Back to TopTop