New differential fault analysis on PRESENT
Open Access
- 4 September 2013
- journal article
- Published by Springer Science and Business Media LLC in EURASIP Journal on Advances in Signal Processing
- Vol. 2013 (1), 145
- https://doi.org/10.1186/1687-6180-2013-145
Abstract
In this paper, we present two differential fault analyses on PRESENT-80 which is a lightweight block cipher. The first attack is a basic attack which induces a fault on only one bit of intermediate states, and we can obtain the last subkey of the block cipher, given 48 faulty cipher texts on average. The second attack can retrieve the master key of the block cipher, given 18 faulty cipher texts on average. In the latter attack, we assume that we can induce faults on a single nibble of intermediate states. Given those faulty cipher texts, the computational complexity of attacks is negligible.This publication has 10 references indexed in Scilit:
- New differential fault analysis on PRESENTEURASIP Journal on Advances in Signal Processing, 2013
- Differential fault analysis of AES: Toward reducing number of faultsInformation Sciences, 2012
- Differential Fault Analysis on SMS4 using a single faultInformation Processing Letters, 2011
- Differential Fault Analysis of the Advanced Encryption Standard Using a Single FaultLecture Notes in Computer Science, 2011
- Single-bit DFA using multiple-byte laser fault injectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit KeysIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010
- Differential fault analysis on the ARIA algorithmInformation Sciences, 2008
- PRESENT: An Ultra-Lightweight Block CipherLecture Notes in Computer Science, 2007
- Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4Lecture Notes in Computer Science, 2005
- Differential fault analysis of secret key cryptosystemsLecture Notes in Computer Science, 1997