Differential Fault Attack on LEA

Abstract : LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms.In this paper we propose a Differential Fault Analysis attack on LEA. By injecting random bit faults in the last round and in the penultimate round, we were able to recover the secret key by using 258 faulty encryptions in average. If the position of faults is known, then only 62 faulty encryptions are needed in order to recover the key which surpasses the results achieved so far.
Keywords : LEA Fault attack DFA
Type de document :
Communication dans un congrès
Ismail Khalil; Erich Neuhold; A Min Tjoa; Li Da Xu; Ilsun You. 3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. Springer, Lecture Notes in Computer Science, LNCS-9357, pp.265-274, 2015, Information and Communication Technology. 〈10.1007/978-3-319-24315-3_27〉
Liste complète des métadonnées

Littérature citée [11 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01466228
Contributeur : Hal Ifip <>
Soumis le : lundi 13 février 2017 - 14:31:26
Dernière modification le : mardi 14 février 2017 - 01:07:56
Document(s) archivé(s) le : dimanche 14 mai 2017 - 14:22:40

Fichier

978-3-319-24315-3_27_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Dirmanto Jap, Jakub Breier. Differential Fault Attack on LEA. Ismail Khalil; Erich Neuhold; A Min Tjoa; Li Da Xu; Ilsun You. 3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. Springer, Lecture Notes in Computer Science, LNCS-9357, pp.265-274, 2015, Information and Communication Technology. 〈10.1007/978-3-319-24315-3_27〉. 〈hal-01466228〉

Partager

Métriques

Consultations de la notice

33

Téléchargements de fichiers

7