2020
DOI: 10.1109/access.2020.3039805
|View full text |Cite
|
Sign up to set email alerts
|

Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition

Abstract: Recently, as the number of IoT (Internet of Things) devices has increased, the use of lightweight cryptographic algorithms that are suitable for environments with scarce resources has also increased. Consequently, the safety of such cryptographic algorithms is becoming increasingly important. Among them, side-channel analysis methods are very realistic threats. In this paper, we propose a novel differential fault attack method on the Lightweight Encryption Algorithm (LEA) cipher which became the ISO/IEC intern… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…It has been discovered that utilizing an inexpensive EM probe allows for simple data eavesdropping from a distance [4]. Moreover, through the use of glitch injection, methods like differential fault attacks (DFAs) [122] have been able to determine private information. Due to their ease of use and low cost, fault injection attacks (FIAs) and EM-SCA have both gained enormous popularity [10,123,124].…”
Section: H Em Fault Injectionmentioning
confidence: 99%
See 1 more Smart Citation
“…It has been discovered that utilizing an inexpensive EM probe allows for simple data eavesdropping from a distance [4]. Moreover, through the use of glitch injection, methods like differential fault attacks (DFAs) [122] have been able to determine private information. Due to their ease of use and low cost, fault injection attacks (FIAs) and EM-SCA have both gained enormous popularity [10,123,124].…”
Section: H Em Fault Injectionmentioning
confidence: 99%
“…LEA (Lightweight Encryption Algorithm) is one such encryption that has been proposed and can be examined using various techniques, including DFA. Lim et al [122] proposes a novel DFA method on the ARX-based lightweight block cypher LEA. The proposed method reduces the number of required fault-injected ciphertexts by approximately 70.97% compared to previously proposed attacks in [152,153] and uses a relaxed fault model, namely Random Word Error.…”
Section: K Other Encryption Algorithmsmentioning
confidence: 99%
“…The DFA mechanism was first proposed in 1997 by E. Biham et al [2]. Starting with DES, research on the DFA has been steadily conducted for various cryptographic algorithms [14]- [17]. In the DFA, the attacker can cause malfunction by injecting artificial faults at specific times during an encryption operation.…”
Section: B Differential Fault Attacksmentioning
confidence: 99%
“…It only consists of the ARX (modular Addition, bitwise Rotation, and bitwise XOR) operations for an array of four 32-bit words. LEA gets the resistance against the attacks for block ciphers and is proved by providing better speed and size on many platforms than AES [5]. For this reason, we chose the LEA approach to create a security tag for message authentication.…”
Section: Related Workmentioning
confidence: 99%