Results 21 to 30 of about 2,028 (248)

Trivium Stream Cipher Countermeasures Against Fault Injection Attacks and DFA

open access: yesIEEE Access, 2021
Attacks on cryptocircuits are becoming increasingly sophisticated, requiring designers to include more and more countermeasures in the design to protect it against malicious attacks.
F. E. Potestad-Ordonez   +4 more
doaj   +1 more source

A Fault Attack on the Family of Enocoro Stream Ciphers

open access: yesCryptography, 2021
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only require that the attacker can reset the internal state and inject a random byte-fault, in a random register, during a known time period.
Julian Danner, Martin Kreuzer
doaj   +1 more source

Practical Attacks on Full-round FRIET

open access: yesIACR Transactions on Symmetric Cryptology, 2022
FRIET is a duplex-based authenticated encryption scheme proposed at EUROCRYPT 2020. It follows a novel design approach for built-in countermeasures against fault attacks.
Senpeng Wang   +4 more
doaj   +1 more source

Differential Fault Attacks on Deterministic Lattice Signatures

open access: yesIACR Transactions on Cryptographic Hardware and Embedded Systems, 2018
In this paper, we extend the applicability of differential fault attacks to lattice-based cryptography. We show how two deterministic lattice-based signature schemes, Dilithium and qTESLA, are vulnerable to such attacks. In particular, we demonstrate that single random faults can result in a nonce-reuse scenario which allows key recovery.
Bruinderink, Leon Groot, Pessl, Peter
openaire   +4 more sources

General Differential Fault Attack on PRESENT and GIFT Cipher With Nibble

open access: yesIEEE Access, 2021
Lightweight block cipher PRESENT is an algorithm with SPN structure. Due to its excellent hardware performance and simple round function design, it can be well applied to Internet of things terminals with limited computing resources.
Haoxiang Luo   +3 more
doaj   +1 more source

A Novel DFA on AES: Based on Two–Byte Fault Model with Discontiguous Rows

open access: yesApplied Sciences, 2023
Differential fault attack (DFA) is a distinctive methodology for acquiring the key to block ciphers, which comprises two distinct strategies: DFA on the state and DFA on the key schedule. Given the widespread adoption of the Advanced Encryption Standard (
Xusen Wan   +4 more
doaj   +1 more source

Differential Fault Attack on the Stream Cipher LIZARD [PDF]

open access: yesChinese Journal of Electronics, 2021
n this paper, we try to give a security evaluation of LIZARD stream cipher in regard to fault attacks, which, to the best of our knowledge, is the first fault analysis on LIZARD. We design a differential engine of LIZARD to track the differential trail of the keystreams. It is shown that the distributions of the keystream differences are heavily biased.
MA Zhen, TIAN Tian, QI Wenfeng
openaire   +1 more source

RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Algebraic Fault Analysis (AFA) is a cryptanalysis for block ciphers proposed by Courtois et al., which incorporates algebraic cryptanalysis to overcome the complexity of manual analysis within the context of Differential Fault Analysis (DFA).
Zehong (Zephyr) Qiu, Fan Zhang
doaj   +1 more source

FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Fault injection attacks are one of the most powerful forms of cryptanalytic attacks on ciphers. A single, precisely injected fault during the execution of a cipher like the AES, can completely reveal the key within a few milliseconds.
Keerthi K   +4 more
doaj   +1 more source

Differential Fault Analysis on the Key Schedule of the LBlock Algorithm

open access: yesIEEE Access, 2022
In 2011, Wu and Zhang proposed a lightweight block cipher named LBlock, whose plaintext size and key size are 64 bits and 80 bits, respectively. As they said, LBlock can be efficiently implemented in constrained hardware environments, such as wireless ...
Haiyan Xiao, Lifang Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy