A survey on fault attacks on symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
DEFAULT: Cipher-level resistance against differential fault attack
A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
Abstract Differential Fault Analysis (DFA) is a well-known cryptanalytic technique that
exploits faulty outputs of an encryption device. Despite its popularity and similarity with the …
exploits faulty outputs of an encryption device. Despite its popularity and similarity with the …
Fault attacks in symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
Classical and physical security of symmetric key cryptographic algorithms
A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm
S Liu, J Ren, J Guan, B Hu, S Ma, H Bai - The Computer Journal, 2024 - academic.oup.com
It had always been believed that there was an inherent barrier to Differential Fault Attack
(DFA) on the nonce-based authenticated encryption algorithm. At CHES 2016, Saha et al …
(DFA) on the nonce-based authenticated encryption algorithm. At CHES 2016, Saha et al …
Incremental fault analysis: Relaxing the fault model of differential fault attacks
TE Pogue, N Nicolici - IEEE Transactions on Very Large Scale …, 2019 - ieeexplore.ieee.org
This article presents a new fault analysis technique against cryptographic devices called the
incremental fault analysis (IFA), which can be adapted into fault attacks using more …
incremental fault analysis (IFA), which can be adapted into fault attacks using more …
Differential fault analysis of NORX using variants of coupon collector problem
In this paper, we report the first DFA on nonce-based CAESAR scheme NORX (applicable to
all the versions v1, v2. 0, v3. 0). This demonstrates a scenario when faults introduced in …
all the versions v1, v2. 0, v3. 0). This demonstrates a scenario when faults introduced in …
Differential fault analysis of NORX
In recent literature, there has been a particular interest in studying nonce-based
Authenticated Encryption (AE) schemes in the light of fault-based attacks as they seem to …
Authenticated Encryption (AE) schemes in the light of fault-based attacks as they seem to …
Fault Attack
A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
Fault attacks are a well-studied topic in the area of attacks on cryptography. They constitute
a powerful tool to recover the secret key used in the encryption process. Fault attacks work …
a powerful tool to recover the secret key used in the encryption process. Fault attacks work …
Cryptanalysis of Selected SPN and NLFSR-based Symmetric-Key Ciphers
A Jana - 2023 - dspace.isical.ac.in
The thesis focuses on the cryptanalysis of private-key ciphers, which are widely used
encryption methods due to their fast encryption/decryption computing ability and low …
encryption methods due to their fast encryption/decryption computing ability and low …