2018
DOI: 10.1049/cje.2018.09.003
|View full text |Cite
|
Sign up to set email alerts
|

Fault Analysis on a New Block Cipher DBlock with at Most Two Fault Injections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 10 publications
(10 reference statements)
0
3
0
Order By: Relevance
“…The statistical results of attack process show that a certain number of fault injections recover most key bits. Combined with exhaustive search, we note that about 31 random nibble faults can recover the master key for GIFT-64 with a computational complexity of 2 16 and about 32 random nibble faults can recover the master key for GIFT-128 with a computational complexity of 2 17 . According to the analysis and experiments in this paper, GIFT is vulnerable to differential fault attack and the encryption device should be protected in actual use.…”
Section: Discussionmentioning
confidence: 97%
See 2 more Smart Citations
“…The statistical results of attack process show that a certain number of fault injections recover most key bits. Combined with exhaustive search, we note that about 31 random nibble faults can recover the master key for GIFT-64 with a computational complexity of 2 16 and about 32 random nibble faults can recover the master key for GIFT-128 with a computational complexity of 2 17 . According to the analysis and experiments in this paper, GIFT is vulnerable to differential fault attack and the encryption device should be protected in actual use.…”
Section: Discussionmentioning
confidence: 97%
“…For RK 26 and RK 25 , there are similar experimental results. Combining with the method of exhaust search, we conclude that only 31 fault injections can recover K of GIFT-64 with a computational complexity of (2 4 × 30.6 + 2 8 × 20.6 + 2 12 × 14.6) × 4/16 × 1/28 + 2 16 ≈ 2 16 . The improved attack greatly reduces the number of fault injections and the difficulty of fault attacks at the level of implementation.…”
Section: Analysis and Improvementmentioning
confidence: 91%
See 1 more Smart Citation
“…Besides the SCA, the first FA against cryptographic implementation was given by Boneh et al in EUROCRYPT'97 [6]. After that, FAs against various kinds of cipher schemes were proposed including DES [7], AES [8], DBlock [9], and so on. Infection [10] is one of the most popular countermeasures to resist FA.…”
Section: Introductionmentioning
confidence: 99%
“…FA model In this paper, we mainly consider the most popular fault attack, i.e., Differential fault attack (DFA) [7], [8]. It is based on the concrete faulty output value.…”
mentioning
confidence: 99%