2013
DOI: 10.1049/iet-net.2012.0117
|View full text |Cite
|
Sign up to set email alerts
|

Differential fault analysis on PRINT cipher

Abstract: The new block cipher PRINTCIPHER was introduced in CHES 2010 as a lightweight block cipher for 'integrated circuit' or IC-'printing' technology. The key of PRINTCIPHER consist of two sub-key components where the first sub-key is 'XORed' to the state in each round, whereas the second sub-key is used to generate the key-dependent permutations. In this study, the authors describe a new differential fault analysis on the lightweight block cipher PRINTCIPHER. The authors present two different fault models for obtai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…A PRINTcipher was proposed for integrated circuit printing [29] however its cryptanalysis has revealed some weaknesses [30], [31]. Similarly Piccolo [32] was proposed as an ultralightweight block ciphers for RFID tags and sensor nodes.…”
Section: Existing Methods and Motivationmentioning
confidence: 99%
“…A PRINTcipher was proposed for integrated circuit printing [29] however its cryptanalysis has revealed some weaknesses [30], [31]. Similarly Piccolo [32] was proposed as an ultralightweight block ciphers for RFID tags and sensor nodes.…”
Section: Existing Methods and Motivationmentioning
confidence: 99%
“…This attack is commonly used to analyze the security of cryptosystems. DFA have been employed to attack several block ciphers where DES [3,4], AES [5][6][7][8][9][10][11], PRINTCIPHER [12], Camellia [13], CALEFIA [14,15], RC4 [16], SMS4 [17], and ARIA [18] are examples. In general, there are two techniques to apply a DFA attack on a block cipher.…”
Section: Introductionmentioning
confidence: 99%
“…In Ref. [16], the authors needed 26(60) faulty cipher texts. Which show that our method is more effective.…”
mentioning
confidence: 99%