Improved Fault Attack on LBlock: Earlier Injection with No Extra Faults  被引量:1

Improved Fault Attack on LBlock: Earlier Injection with No Extra Faults

在线阅读下载全文

作  者:GAO Si CHEN Hua FAN Limin WU Wenling 

机构地区:[1]Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences [2]Graduate University of Chinese Academy of Sciences

出  处:《Chinese Journal of Electronics》2017年第4期754-759,共6页电子学报(英文版)

基  金:supported by the National Basic Research Program of China(973 Program)(No.2013CB338002)

摘  要:As one of the most popular lightweight ciphers in recent years, LBlock has attracted great attention.Researchers have explored the security of LBlock against various attacks. We focus on fault attack—one of the most important implementation attacks. In the past two years,fault attacks under the random fault model have been successfully applied to LBlock, supposing faults were injected at the end of the 24 th to the 31 st round. If faults are injected at the end of the 23 rd round, previous attacks only work under the semi-random fault model. For the first time, we address this issue and propose a 23 rd round fault attack under the random fault model. Compared with the previous works, our attack extends the fault injection to earlier round, with reasonable time cost and no extra faults. Experiments show that it only takes 10 faults to recover the secret key.As one of the most popular lightweight ciphers in recent years, LBlock has attracted great attention.Researchers have explored the security of LBlock against various attacks. We focus on fault attack—one of the most important implementation attacks. In the past two years,fault attacks under the random fault model have been successfully applied to LBlock, supposing faults were injected at the end of the 24 th to the 31 st round. If faults are injected at the end of the 23 rd round, previous attacks only work under the semi-random fault model. For the first time, we address this issue and propose a 23 rd round fault attack under the random fault model. Compared with the previous works, our attack extends the fault injection to earlier round, with reasonable time cost and no extra faults. Experiments show that it only takes 10 faults to recover the secret key.

关 键 词:Implementation analysis Fault analysis Random fault model 

分 类 号:TN918.1[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象