2014 Workshop on Fault Diagnosis and Tolerance in Cryptography 2014
DOI: 10.1109/fdtc.2014.14
|View full text |Cite
|
Sign up to set email alerts
|

Differential Fault Analysis on the Families of SIMON and SPECK Ciphers

Abstract: In 2013, the US National Security Agency proposed two new families of lightweight block ciphers: SIMON and SPECK. Currently, linear and differential cryptanalytic results for SIMON are available in the literature but no fault attacks have been reported so far on these two cipher families. In this paper, we show that these families of ciphers are vulnerable to differential fault attacks. Specifically, we demonstrate two fault attacks on SIMON and one fault attack on SPECK. The first attack on SIMON assumes a bi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(45 citation statements)
references
References 8 publications
0
45
0
Order By: Relevance
“…In Shi, Danping, et al [5], research on linear(hull) cryptanalysis of SIMON block cipher round-reduced version by using linear characteristic on round function of SIMON block cipher and considered the dependence of S-boxes in the evaluation. There is a differential fault analysis on SIMON and SPECK ciphers [6], they assumed a bit-flip fault model and recover on n-bit round key of SIMON cipher using n/2 bit faults. On sidechannel perspective, research on side-channel perspective of SIMON block cipher FPGA implementations [7], they retrieve the secret key from the FPGA implementations.…”
Section: Simon and Speck Recent Researchmentioning
confidence: 99%
“…In Shi, Danping, et al [5], research on linear(hull) cryptanalysis of SIMON block cipher round-reduced version by using linear characteristic on round function of SIMON block cipher and considered the dependence of S-boxes in the evaluation. There is a differential fault analysis on SIMON and SPECK ciphers [6], they assumed a bit-flip fault model and recover on n-bit round key of SIMON cipher using n/2 bit faults. On sidechannel perspective, research on side-channel perspective of SIMON block cipher FPGA implementations [7], they retrieve the secret key from the FPGA implementations.…”
Section: Simon and Speck Recent Researchmentioning
confidence: 99%
“…For instance, the attacker prefers to inject faults at the last few rounds of AES [5,8]. Another example, if the attacker targets the left half input of the penultimate round in SIMON, the key can be retrieved from the last round [16].…”
Section: A Random Fault Injection Versus Fault Attacksmentioning
confidence: 99%
“…From the attack methodology point of view, the closest attack proposal to this paper is the attak proposed by Tupsamudre et al [9], aiming at SPECK cipher. Since SPECK uses the ARX structure as well, authors aimed at the only non-linear operation, at the modular addition.…”
Section: Related Workmentioning
confidence: 99%
“…Since the first publication proposing a fault analysis as a method to retrieve the secret information from the encryption process proposed by Boneh, DeMillo, and Lipton in 1997 [3] From the attack methodology point of view, the closest attack proposal to this paper is the attak proposed by Tupsamudre et al [9], aiming at SPECK cipher. Since SPECK uses the ARX structure as well, authors aimed at the only non-linear operation, at the modular addition.…”
Section: Related Workmentioning
confidence: 99%