New differential fault analysis on PRESENT

39Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we present two differential fault analyses on PRESENT-80 which is a lightweight block cipher. The first attack is a basic attack which induces a fault on only one bit of intermediate states, and we can obtain the last subkey of the block cipher, given 48 faulty cipher texts on average. The second attack can retrieve the master key of the block cipher, given 18 faulty cipher texts on average. In the latter attack, we assume that we can induce faults on a single nibble of intermediate states. Given those faulty cipher texts, the computational complexity of attacks is negligible. © 2013 Bagheri et al.; licensee Springer.

Cite

CITATION STYLE

APA

Bagheri, N., Ebrahimpour, R., & Ghaedi, N. (2013). New differential fault analysis on PRESENT. Eurasip Journal on Advances in Signal Processing, 2013(1). https://doi.org/10.1186/1687-6180-2013-145

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free