Results 11 to 20 of about 2,028 (248)

Algebraic Fault Attack Against SIMECK Cipher Based on Optimized Fault Location [PDF]

open access: yesJisuanji gongcheng, 2019
This paper proposes a algebraic fault attack method based on optimized fault location against SIMECK cipher.By analyzing encryption diffusion defect of the SIMECK round function and the failure cause,the deterministic propagation characteristics of ...
HUANG Changyang, WANG Tao, WANG Xiaohan, CHEN Qingchao, YIN Shizhuang
doaj   +1 more source

A method for fault recognition in the last three rounds of Advanced Encryption Standard

open access: yesElectronics Letters, 2021
A large number of studies are there for Advanced Encryption Standard (AES) fault attack analysis, but less for fault recognition. This paper presents a recognition method for single‐byte fault which is induced in the last three rounds of AES.
Huilong Jiang   +5 more
doaj   +1 more source

Differential Fault Attack on LEA [PDF]

open access: yes, 2015
LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms.
Jap, Dirmanto, Breier, Jakub
openaire   +2 more sources

Experimental evaluation of differential fault attack on lightweight block cipher PIPO

open access: yesIET Information Security, 2023
The recent development of Internet of Things (IoT) devices has increased related security issues. Because of the rapid increase in the use of these devices, the possibility of accessing and hijacking cryptographic devices is increasing.
SeongHyuck Lim, Dong‐Guk Han
doaj   +1 more source

Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition

open access: yesIEEE Access, 2020
Recently, as the number of IoT (Internet of Things) devices has increased, the use of lightweight cryptographic algorithms that are suitable for environments with scarce resources has also increased.
Seonghyuck Lim   +2 more
doaj   +1 more source

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD

open access: yesIEEE Access, 2021
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in the National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis of
Iftekhar Salam   +5 more
doaj   +1 more source

A Differential Fault Attack on MICKEY 2.0 [PDF]

open access: yesJournal of Cryptographic Engineering, 2013
In this paper we present a differential fault attack on the stream cipher MICKEY 2.0 which is in eStream's hardware portfolio. While fault attacks have already been reported against the other two eStream hardware candidates Trivium and Grain, no such analysis is known for MICKEY.
Subhadeep Banik, Subhamoy Maitra
openaire   +3 more sources

DFARPA: Differential fault attack resistant physical design automation [PDF]

open access: yes2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018
Differential Fault Analysis (DFA), aided by sophisticated mathematical analysis techniques for ciphers and precise fault injection methodologies, has become a potent threat to cryptographic implementations. In this paper, we propose, to the best of the our knowledge, the first “DFA-aware” physical design automation methodology, that effectively ...
Khairallah, Mustafa   +7 more
openaire   +2 more sources

Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem

open access: yesIEEE Access, 2019
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong   +5 more
doaj   +1 more source

Single-Byte Error-Based Practical Differential Fault Attack on Bit-Sliced Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat.
Seonghyuck Lim   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy