DFA on LS-Designs with a Practical Implementation on SCREAM

5Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

LS-Designs are a family of SPN-based block ciphers whose linear layer is based on the so-called interleaved construction. They will be dedicated to low-end devices with high performance and low-resource constraints, objects which need to be resistant to physical attacks. In this paper we describe a complete Differential Fault Analysis against LS-Designs and also on other families of SPN-based block ciphers. First we explain how fault attacks can be used against their implementations depending on fault models. Then, we validate the DFA in a practical example on a hardware implementation of SCREAM running on an FPGA. The faults have been injected using electromagnetic pulses during the execution of SCREAM and the faulty ciphertexts have been used to recover the key’s bits. Finally, we discuss some countermeasures that could be used to thwart such attacks.

Cite

CITATION STYLE

APA

Lac, B., Canteaut, A., Fournier, J., & Sirdey, R. (2017). DFA on LS-Designs with a Practical Implementation on SCREAM. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10348 LNCS, pp. 223–247). Springer Verlag. https://doi.org/10.1007/978-3-319-64647-3_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free