2012
DOI: 10.1007/978-3-642-29912-4_10
|View full text |Cite
|
Sign up to set email alerts
|

A Fault Attack on the LED Block Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
55
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 52 publications
(57 citation statements)
references
References 9 publications
0
55
0
Order By: Relevance
“…The fault-affected output values are collected, and differential cryptanalysis is used to derive the secret key. Recently, a number of highly efficient attacks on state-of-the-art ciphers including AES [5], LED [6], [7], PRESENT [8] and PRINCE [7], [9] have been reported. These attacks need a small number of fault injections (1 for AES and LED64, around 3-4 for LED128 and PRINCE) for successful key recovery.…”
Section: Introductionmentioning
confidence: 99%
“…The fault-affected output values are collected, and differential cryptanalysis is used to derive the secret key. Recently, a number of highly efficient attacks on state-of-the-art ciphers including AES [5], LED [6], [7], PRESENT [8] and PRINCE [7], [9] have been reported. These attacks need a small number of fault injections (1 for AES and LED64, around 3-4 for LED128 and PRINCE) for successful key recovery.…”
Section: Introductionmentioning
confidence: 99%
“…is derived by differential cryptanalysis of and . For example, one can supplement the equation ( , ) = by the findings from the differential cryptanalysis that quickly guide the solution procedure towards the key [18]. Therefore, fault-based attacks target the implementation of the cryptographic algorithm rather than the algorithm itself and thus overcome its cryptographic strength.…”
Section: Fault-based Attacksmentioning
confidence: 99%
“…Therefore, fault-based attacks target the implementation of the cryptographic algorithm rather than the algorithm itself and thus overcome its cryptographic strength. A number of techniques are known for introducing physical faults; these include manipulation of the clock signal, voltage supply, and pinpointed irradiation by a laser [18].…”
Section: Fault-based Attacksmentioning
confidence: 99%
“…Then Biham and Shamir proposed the DFA attack in 1997, which processes the right and faulty outputs with differential cryptanalysis [8]. After that, DFA has been successfully applied to many block ciphers and stream ciphers, such as AES [12,33,34], SHACAL1 [11], LED [35,36], Piccolo [37], PRINCE [24], Trivium [9,23], RC4 [13,14]. Besides attacks against block and stream ciphers, the DFA attack on the compression function of a hash function has also been studied.…”
Section: Introductionmentioning
confidence: 99%
“…An important advantage of AFA over DFA is that AFA does not rely on the manual analysis of differential propagations. By applying AFA, the previous DFA attacks on block and stream ciphers have been improved, such as AES [30], LED [26,31], Piccolo [4], Trivium [29].…”
Section: Introductionmentioning
confidence: 99%