2018
DOI: 10.1007/s11432-017-9209-0
|View full text |Cite
|
Sign up to set email alerts
|

Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs

Abstract: With the expansion of wireless technology, vehicular ad-hoc networks (VANETs) are emerging as a promising approach for realizing smart cities and addressing many serious traffic problems, such as road safety, convenience, and efficiency. To avoid any possible rancorous attacks, employing lightweight ciphers is most effective for implementing encryption/decryption, message authentication, and digital signatures for the security of the VANETs. Light encryption device (LED) is a lightweight block cipher with two … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…Then, WK can be obtained according to the following formula: 16 ). (14) According to the key schedule of Midori, the adversary makes further derivations to obtain K 0 . The equations are shown in Equations (15) to (19).…”
Section: Analysis Of Fault Difference Equationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, WK can be obtained according to the following formula: 16 ). (14) According to the key schedule of Midori, the adversary makes further derivations to obtain K 0 . The equations are shown in Equations (15) to (19).…”
Section: Analysis Of Fault Difference Equationsmentioning
confidence: 99%
“…Since Boneh et al [9] used fault attacks to break RSA, effective fault analysis methods have become research hotspot. In lightweight block encryption analysis, fault attacks have been extended to impossible differential fault attack (IDFA) [10], impossible differential attack (IDA) [11,12], algebraic fault attack (AFA) [13], impossible meet-in-the-middle attack (IMMA) [14], differential fault attack (DFA) [15] and blind fault attack [16]. These methods mainly analyze the characteristic relationship between the data of the cryptosystem after the injection fault and obtain the secret key by means of solver and mathematical analysis.…”
Section: Introductionmentioning
confidence: 99%
“…This scheme requires 2 16 key searches to correctly guess the secret key. Li et al proposed a novel impossible meet‐in‐the‐middle fault analysis to break the LED. In this attack, the faults can be inserted into the fourth last round of the LED, and subsequently the more rounds are affected.…”
Section: Related Workmentioning
confidence: 99%
“…The PRESENT block cipher was standardised by ISO/IEC 29192-2 [14] and the SIMON cipher has been standardised by ISO as a part of the radio frequency identification (RFID) air interface standard, International Standard ISO/29167-21 for use by commercial entities. The security and robustness of PRESENT, SIMON, and LED are investigated in [11][12][13][14][15][16][17][18] by testing resistance against different attacks such as linear attack, differential attack, boomerang attack, higher-order differential attack, interpolation attack, impossible differential attack, improved zero-correlation attack, cube tester, square/collision attack, impossible meet-in-the-middle (MITM) fault analysis, algebraic, and rectangle. The slide attack is a block cipher cryptanalysis technique [13] that exploits the degree of selfsimilarity of a permutation.…”
Section: Introductionmentioning
confidence: 99%