Results 251 to 260 of about 184,630 (295)
Some of the next articles are maybe not open access.
Differential Fault Analysis of Streebog
2015In August 2012, the Streebog hash function was selected as the new Russian federal hash function standard (GOST R 34.11-2012). In this paper, we present a fault analysis attack on this new hashing standard. In particular, our attack considers the compression function in the secret key setting where both the input chaining value and the message block ...
Riham AlTawy, Amr M. Youssef
openaire +1 more source
Improved Differential Fault Analysis on CLEFIA
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008We propose a more efficient differential fault analysis (DFA) attack on CLEFIA, the 128-bit block cipher developed by Sony Corporation in 2007. In the previous study, the most efficient DFA attack on CLEFIA with a 128-bit key uses approximately 18 pairs of correct and faulty ciphertexts.
Junko Takahashi, Toshinori Fukunaga
openaire +1 more source
Differential Fault Analysis on SHACAL-1
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2009SHACAL-1, known as one of the finalists of the NESSIE project, originates from the compression component of the widely used hash function SHA-1. The requirements of confusion and diffusion are implemented through mixing operations and rotations other than substitution and permutation, thus there exists little literature on its immunity against fault ...
Ruilin Li, Chao Li, Chunye Gong
openaire +1 more source
Differential Fault Analysis of Twofish
2013In this paper we propose Differential Fault Analysis (DFA) of Twofish which was one of the five AES finalists. It uses the concept of key-dependent S-boxes and Pseudo-Hadamard Transform, which make the cipher secure against differential attack. Each S-box is dependent on key because of which the S-box is not known to the attacker.
Sk Subidh Ali, Debdeep Mukhopadhyay
openaire +1 more source
Improved Differential Fault Analysis of CLEFIA
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013CLEFIA is already shown to be vulnerable to differential fault analysis (DFA). The existing state-of-the-art DFA shows that two faults are enough to break CLEFIA-128, whereas for CLEFIA-192 and CLEFIA-256 ten faults are needed. Side-by-side it emphasizes the need for protecting last four rounds of the cipher in order to make it secure against the ...
Sk. Subidh Ali, Debdeep Mukhopadhyay
openaire +1 more source
Differential Fault Analysis Using Symbolic Execution
Proceedings of the 7th Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop, 2017Differential fault analysis (DFA) is a cryptanalytic attack that uses corrupted cipher executions to extract secret/private keys. Traditionally applied in hardware-based systems, it is now being actively used in extracting keys from (whiteboxed) software cipher implementations.
Jasper van Woudenberg +4 more
openaire +1 more source
Differential Fault Analysis of SHA-3 Under Relaxed Fault Models
Journal of Hardware and Systems Security, 2017Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA-3) will be widely used in cryptosystems, and evaluating their security against different kinds of attacks is vitally important. This paper presents an efficient differential fault analysis (DFA) method on all four modes of SHA-3 to recover an entire internal state, which leads to message ...
Pei Luo +3 more
openaire +1 more source
IEEE Transactions on Information Forensics and Security, 2017
Classical fault attacks, such as differential fault analysis(DFA) as well as biased fault attacks, such as the differential fault intensity analysis (DFIA), have been a major threat to cryptosystems in recent times. DFA uses pairs of fault-free and faulty ciphertexts to recover the secret key.
Sikhar Patranabis +3 more
openaire +1 more source
Classical fault attacks, such as differential fault analysis(DFA) as well as biased fault attacks, such as the differential fault intensity analysis (DFIA), have been a major threat to cryptosystems in recent times. DFA uses pairs of fault-free and faulty ciphertexts to recover the secret key.
Sikhar Patranabis +3 more
openaire +1 more source
Differential Fault Analysis of SHA-3
2015In this paper we present the first differential fault analysis DFA of SHA-3. This attack can recover the internal state of two versions of SHA-3 namely, SHA3-512 and SHA3-384 and can be used to forge MAC's which are using these versions of SHA-3. Assuming that the attacker can inject a random single bit fault on the intermediate state of the hash ...
Nasour Bagheri +2 more
openaire +1 more source
Differential Fault Analysis of HC-128
2010HC-128 is a high speed stream cipher with a 128-bit secret key and a 128-bit initialization vector. It has passed all the three stages of the ECRYPT stream cipher project and is a member of the eSTREAM software portfolio. In this paper, we present a differential fault analysis attack on HC-128.
Aleksandar Kircanski, Amr M. Youssef
openaire +1 more source

