Integral based fault attack on LBlock

4Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

LBlock is a 32-round lightweight block cipher presented at ACNS2011. In this paper, the fault attack on LBlock is explored. The first fault attack on LBlock was presented at COSADE2012, which can reveal the master key when faults are respectively induced at the end of the round from 24thto 31stround. When faults were injected at the end of the round from 25thto 31stround, the random bit fault model was adopted. While when the fault was induced into the right part of the end of 24thround encryption, the attack only worked under the semi-random model, which means the adversary must know the induce position. In this paper, we firstly applied fault attack on LBlock successfully with faults induced into the right part at the end of 24thround encryption under random nibble fault model. In our attack, eight 8-round integral distinguishers of LBlock are fully utilized to help determine the exact induce positions of faulty ciphertexts.Moreover, we also firstly apply fault attack with faults induced into the right part at the end of 23thround encryption under semi-random nibble model. Finally, the computer simulation results verify the efficiency of our attack.

Cite

CITATION STYLE

APA

Chen, H., & Fan, L. (2014). Integral based fault attack on LBlock. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8565, pp. 227–240). Springer Verlag. https://doi.org/10.1007/978-3-319-12160-4_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free