2019
DOI: 10.1007/s13389-019-00217-3
|View full text |Cite
|
Sign up to set email alerts
|

Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…[16]- [20], where theoretical attacks were modelled. Faults were injected into the internal state of the cipher to retrieve secret information from the device.…”
Section: A Previous Workmentioning
confidence: 99%
See 2 more Smart Citations
“…[16]- [20], where theoretical attacks were modelled. Faults were injected into the internal state of the cipher to retrieve secret information from the device.…”
Section: A Previous Workmentioning
confidence: 99%
“…Table 1 summarizes the requirements for each DFA model for retrieving the secret internal state, and therefore the secret K and IV, of the cipher, showing the reference, the number of fault injections and the number of faulty key stream bits. Note that the attacks presented in [16]- [20] are not included in this analysis, since these attacks are against the mathematical algorithm itself and not against the physical implementations, therefore they are out of our scope.…”
Section: B Theoretical Vulnerabilities Of Triviummentioning
confidence: 99%
See 1 more Smart Citation
“…It should be noted that none of these works attempt to experimentally test the vulnerability of the Trivium cipher, proving the feasibility of the faults needed, but rather base their hypotheses on theoretical assumptions, discarding the experimental aspect. On the other hand, good examples of the continuous and recent interest in breaking this encryption algorithm, apart from the DFA, are the works presented in [15][16][17][18][19][20]. An attack on the bitstream used to configure an FPGA with the Trivium cipher implemented is presented in [15].…”
Section: Introductionmentioning
confidence: 99%
“…A study of cubic attacks against the cipher is proposed in [19] and a new method for finding non-linear superpolies using the linearity test principle is also described. Finally, in [20], a cube attack is performed, showing that it is able to recover the key in the 781 round of Trivium.…”
Section: Introductionmentioning
confidence: 99%