In this paper, we present two differential fault analyses on PRESENT-80 which is a lightweight block cipher. The first attack is a basic attack which induces a fault on only one bit of intermediate states, and we can obtain the last subkey of the block cipher, given 48 faulty cipher texts on average. The second attack can retrieve the master key of the block cipher, given 18 faulty cipher texts on average. In the latter attack, we assume that we can induce faults on a single nibble of intermediate states. Given those faulty cipher texts, the computational complexity of attacks is negligible. © 2013 Bagheri et al.; licensee Springer.
CITATION STYLE
Bagheri, N., Ebrahimpour, R., & Ghaedi, N. (2013). New differential fault analysis on PRESENT. Eurasip Journal on Advances in Signal Processing, 2013(1). https://doi.org/10.1186/1687-6180-2013-145
Mendeley helps you to discover research relevant for your work.