2022
DOI: 10.1016/j.jisa.2022.103205
|View full text |Cite
|
Sign up to set email alerts
|

The differential fault analysis on block cipher KLEIN-96

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Within the field of cryptanalysis, DFA is one of the most popular techniques for compromising the security of encryption algorithms. An example of this is its continued application to most proposed encryption algorithms [32]- [35]. Its principle of operation is based on combining fault injection with mathematical analysis of the effect produced by these faults on the operation of the ciphers.…”
Section: A Dfa On Aesmentioning
confidence: 99%
“…Within the field of cryptanalysis, DFA is one of the most popular techniques for compromising the security of encryption algorithms. An example of this is its continued application to most proposed encryption algorithms [32]- [35]. Its principle of operation is based on combining fault injection with mathematical analysis of the effect produced by these faults on the operation of the ciphers.…”
Section: A Dfa On Aesmentioning
confidence: 99%
“…One FA technique proposed to crack block ciphers like AES [9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27], KLEIN [28,29], SIMON [30,31], and SIMECK [32,33] is differential fault attack (DFA). It operates by taking advantage of differences in information between correct and fault ciphertexts, which poses a serious threat to the encryption executive equipment.…”
Section: Introductionmentioning
confidence: 99%
“…We note that in the general research on DFA, researchers often considered the fault injection into the encryption states or key schedule of cryptographic algorithms. 21 In fact, the key schedule, which is used to generate all the round subkeys, is also included in the encryption devices. It is also possible to induce the faults into it.…”
Section: Introductionmentioning
confidence: 99%