Fault Analysis Against Final Round of L-Block

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A lightweight block cipher L-Block was presented in ACNS 2011 with various security analysis for hardware-constrained environment. Parameter such as clock cycle, throughput and gate equivalent (GE) were investigated to prove the cipher strength. This paper provides the ineffective fault analysis (IFA) and differential fault analysis (DFA) on L-Block. A byte-wise random fault injection and stuck-at-0/1 models efficiently retrieved the unknown key in Feistel function. Byte-wise fault model requires four faulty ciphertexts which reduce key search space from 2 32 to 2 8. Ineffective stuck-at-fault model extracted round key in 32 attempts on software-simulated platforms. We simulated both attacks on INTEL(R) CORE(TM) i7-8700 CPU @ 3.20 GHz and 3.19 GHz computer system.

Cite

CITATION STYLE

APA

Sutar, S., Tiwari, V., Singh, A., & Saxena, A. (2022). Fault Analysis Against Final Round of L-Block. In Smart Innovation, Systems and Technologies (Vol. 283, pp. 583–591). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-16-9705-0_57

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free