Results 261 to 270 of about 184,630 (295)
Some of the next articles are maybe not open access.
Differential Fault Analysis of Full LBlock
2012$\textsf{LBlock}$ is a 64-bit lightweight block cipher which can be implemented in both hardware environments and software platforms. It was designed by Wu and Zhang, and published at ACNS2011. In this paper, we explore the strength of $\textsf{LBlock}$ against the differential fault analysis ( $\textsf{DFA}$ ).
Liang Zhao +2 more
openaire +1 more source
Differential Fault Analysis of MICKEY-128 2.0
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013This paper presents a differential fault analysis of the MICKEY-128 2.0 stream cipher, one of the finalist of eStream project. The current attack works on MICKEY-128 2.0 with 320 state register-bits and requires 480 number of random single bit faults to break it.
Sandip Karmakar, Dipanwita Roy Chowdhury
openaire +1 more source
Differential Fault Analysis of DES
2012This chapter reviews the techniques an attacker could employ to conduct a Differential Fault Analysis of the Data Encryption Standard (DES). Biham and Shamir proposed the first such attack on a block cipher based on the differential cryptanalysis of DES. This attack was later extended to permit an attack based on faults in the early or middle rounds of
openaire +1 more source
Differential Fault Analysis on PRESENT Key Schedule
2010 International Conference on Computational Intelligence and Security, 2010PRESENT is a lightweight block cipher designed by A. Bogdanov et al. in 2007 for extremely constrained environments such as RFID tags and sensor networks, where the AES is not suitable for. In this paper, the strength of PRESENT against the differential fault attack on the key schedule is explored.
Gaoli Wang, Shaohui Wang
openaire +1 more source
Classical Countermeasures Against Differential Fault Analysis
2018In the preceding discussion, we have presented to the readers a variety of fault attacks on a wide range of cryptographic algorithms across hardware and software-based implementations. It is therefore established, by now, that fault attacks are a serious threat to the security of hardware implementations, and consequently, sound countermeasures must be
Sikhar Patranabis, Debdeep Mukhopadhyay
openaire +1 more source
Differential fault analysis of ARIA in multi-byte fault models
Journal of Systems and Software, 2012Differential fault analysis exploits faults to find secret information stored in a cryptographic device. It utilizes differential information between correct and faulty ciphertexts. We introduce new techniques to improve the previous differential fault analysis of ARIA. ARIA is a general-purpose involutional SPN (substitution permutation network) block
openaire +1 more source
Differential Fault Analysis Automation on Assembly Code
2019Normally, fault attack models are determined by analyzing the cipher algorithm and finding exploitable spots in non-linear and permutation layers. However, due to optimizations and different ways of realizing algorithmic operations, cipher level analysis does not capture enough details to locate the vulnerable parts of software implementations.
Jakub Breier, Xiaolu Hou, Yang Liu
openaire +1 more source
Improved Differential Fault Analysis on Camellia-128
2016In this paper we propose improved Differential Fault Analysis (DFA) on the block cipher Camellia with a 128-bit key. Existing DFAs on Camellia-128 require several faults induced at multiple rounds, at least two of which must be induced at or after the 16-th round.
Toru Akishita, Noboru Kunihiro
openaire +1 more source
Evidence for the utility of quantum computing before fault tolerance
Nature, 2023Youngseok Kim +2 more
exaly

