Differential fault attack on SIMON with very few faults

6Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

SIMON, a block cipher proposed by NSA (2013), has received a lot of attention from the cryptology community. Several cryptanalytic results have been presented on its reduced-round variants. In this work, we evaluate the cipher against Differential Fault Attack (DFA). Our analysis shows that SIMON32/64, SIMON48/96 and SIMON64/128 can be attacked by injecting as little as 4, 6 and 9 faults respectively. We first describe the process of identifying the fault locations after injecting random faults. This exploits statistical correlations. Then we show how one can recover the complete key using SAT solvers. To the best of our knowledge, our results are much superior in terms of minimal number of faults compared to the existing results. We also show our results are superior in terms of injecting the faults in the earlier rounds compared to the existing works.

Cite

CITATION STYLE

APA

Anand, R., Siddhanti, A., Maitra, S., & Mukhopadhyay, S. (2018). Differential fault attack on SIMON with very few faults. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11356 LNCS, pp. 107–119). Springer Verlag. https://doi.org/10.1007/978-3-030-05378-9_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free