Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks

17Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

LBlock is a 64-bit lightweight block cipher which can be implemented in both constrained hardware environments, such as wireless sensor network, and software platforms. In this paper, we study the security of LBlock against a differential fault analysis. Based on a random nibble fault model, we propose two versions of the attack on LBlock. In the first attack, we inject random nibble faults to the input register of round 29. As a result, it can recover the secret key of LBlock using an exhaustive search of 225 and five random nibble fault injections on average. This attack can be simulated on a general PC within a few seconds. In the case of second attack, random nibble faults are induced to the input register of round 30. This attack can recover the secret key of LBlock using an exhaustive search of 230 and seven random nibble fault injection on average. This attack can be simulated on a general PC within 1 h. These results are superior to known differential fault analytic result on LBlock. © 2013 Jeong et al.; licensee Springer.

Cite

CITATION STYLE

APA

Jeong, K., Lee, C., & In Lim, J. (2013). Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks. Eurasip Journal on Wireless Communications and Networking, 2013(1). https://doi.org/10.1186/1687-1499-2013-151

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free