2022
DOI: 10.1016/j.jisa.2022.103155
|View full text |Cite
|
Sign up to set email alerts
|

An efficient differential fault attack against SIMON key schedule

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…In the infection countermeasure unit, a randomized diffusion function is designed to close the loopholes in the infection mechanism mentioned in Section 2.2 (that is, it cannot be resistant to fault attacks which are based on the byte fault model). The specific expression of the designed diffusion function F is shown in (2).…”
Section: Randomized Design Of the Diffusion Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the infection countermeasure unit, a randomized diffusion function is designed to close the loopholes in the infection mechanism mentioned in Section 2.2 (that is, it cannot be resistant to fault attacks which are based on the byte fault model). The specific expression of the designed diffusion function F is shown in (2).…”
Section: Randomized Design Of the Diffusion Functionmentioning
confidence: 99%
“…As an international common encryption algorithm, block cipher has been widely used in security systems such as IoT, aerospace, medical, transportation, finance, and identity verification [1][2][3][4][5]. Since the proposal of the advanced encryption standard (AES), as an important part of block cipher, many attack methods have emerged against its hardware and software [1,[5][6][7][8][9][10][11][12][13], and, among these attack methods, fault attacks have the advantages of high attack capability and low time complexity, which pose a great threat to the security of the AES [5,[11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, based on those DFA on PIPO cipher, we recommend applying some countermeasures against DFA when using PIPO as well as other bit-sliced block ciphers on IoT devices. 25 Compared with previously DFAs on SIMON, their attack only required the fewest fault injections. In the reverse direction, BAKSI tried to seek the answer: how exactly DFA works and how can one construct a block cipher to protect against it.…”
Section: Introductionmentioning
confidence: 99%
“…They gave two ways of error propagation methods and an intermediate error propagation state table. Recently, Zhang et al presented how to launch DFA on SIMON's key schedule in the random bit fault model 25 . Compared with previously DFAs on SIMON, their attack only required the fewest fault injections.…”
Section: Introductionmentioning
confidence: 99%
“…One FA technique proposed to crack block ciphers like AES [9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27], KLEIN [28,29], SIMON [30,31], and SIMECK [32,33] is differential fault attack (DFA). It operates by taking advantage of differences in information between correct and fault ciphertexts, which poses a serious threat to the encryption executive equipment.…”
Section: Introductionmentioning
confidence: 99%