Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








202 Hits in 7.1 sec

A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers

Fan Zhang, Shize Guo, Xinjie Zhao, Tao Wang, Jian Yang, Francois-Xavier Standaert, Dawu Gu
2016 IEEE Transactions on Information Forensics and Security  
Inspired by an earlier framework for the analysis of side-channel attacks presented at EUROCRYPT 2009, a new generic framework is proposed to analyze and evaluate algebraic fault attacks on lightweight  ...  Algebraic fault analysis (AFA), which combines algebraic cryptanalysis with fault attacks, has represented serious threats to the security of lightweight block ciphers.  ...  CONCLUSION AND FUTURE WORK This paper proposes a generic framework for algebraic fault analysis on block ciphers.  ... 
doi:10.1109/tifs.2016.2516905 fatcat:cdr7hz3inzbc5mutx3z2e7jwna

A Review on Performance Evaluation Criteria and Tools for Lightweight Block Ciphers

Deepti Sehrawat, Maharshi Dayanand University, Rohtak, Haryana (India)
2019 International Journal of Advanced Trends in Computer Science and Engineering  
There are several parameters for both hardware and software implementations that are set to assess the ciphers.  ...  Security is considered as one of the most important concerns of constraint end nodes.  ...  The proposed framework, XFC "eXploitable Fault Characterization" makes use of colors for the analysis of fault propagation and exploitability.  ... 
doi:10.30534/ijatcse/2019/47832019 fatcat:h53wq7vj6bfdxhuekl7t7cz2yi

A Security Analysis of IoT Encryption : Side Channel Cube Attack on SIMECK32/64

Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad
2018 International Journal of Computer Networks & Communications  
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications.  ...  Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube attack.  ...  The analysis of side-channel attack on a block cipher is important for the considerations in the cryptosystem implementation.  ... 
doi:10.5121/ijcnc.2018.10406 fatcat:dj6gi43vjfc2lcv5e3suhmqqom

A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses

Hasindu Madushan, Iftekhar Salam, Janaka Alawatugoda
2022 Electronics  
We also review existing analyses of these finalists with a specific focus on the review of fault attacks.  ...  The final round of the competition is still in progress, and the NIST will select the winner based on their and third-party evaluations.  ...  For instance, XOR-ing the output of a block cipher with the tweak and encrypting again is a way to construct a secure cipher.  ... 
doi:10.3390/electronics11244199 fatcat:lopji75eujfd5jsorgcrhhygla

Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions [article]

Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain
2021 IACR Cryptology ePrint Archive  
Over the period of past two decades or so, a bulk of lightweight block ciphers have been proposed due to the growing need and demand in lightweight cryptography.  ...  Block ciphers have been extremely predominant in the area of cryptography and due to the paradigm shift towards devices of resource constrained nature, lightweight block ciphers have totally influenced  ...  It is based on the SPN structure that iterates over 31 rounds. The security analysis of this cipher shows it to be resistant to differential, linear and algebraic attacks.  ... 
dblp:journals/iacr/DarLH21 fatcat:e7degswt35gefavnsbmu53r7ky

Local Clock Glitching Fault Injection with Application to the ASCON Cipher

G Surya, Paolo Maistri, Sriram Sankaran
2020 2020 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)  
In particular, we implement the ASCON cipher and propose a methodology for fault injection attacks using synchronous clock glitching by Digital Clock Manager (DCM) introducing a novel approach of locality  ...  Modeling and understanding the impact of these attacks on cipher operations and end users is mandatory.  ...  ASCON is a block cipher family of authenticated encryption and hashing algorithms designed for being lightweight and simple to implement, even with additional countermeasures against side-channel attacks  ... 
doi:10.1109/ises50453.2020.00067 fatcat:pq6ixrmvurauxjrw3vahuekmom

ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things [article]

Hadi Mardani Kamali, Kimia Zamiri Azar, Shervin Roshanisefat, Ashkan Vakil, Avesta Sasan
2020 arXiv   pre-print
The resource-constrained nature of the Internet of Things (IoT) devices, poses a challenge in designing a secure, reliable, and particularly high-performance communication for this family of devices.  ...  Although the overall structure of the proposed scheme is leaky against physical attacks, such as side-channel or new scan-based Boolean satisfiability (SAT) attack or algebraic attack, we introduce a dynamic  ...  Algebraic Attacks Algebraic attacks involve (a) expressing the cipher operations as a system of equations, (b) substituting in known data for some variables, and (c) solving for the key.  ... 
arXiv:2004.06235v1 fatcat:ffeh65o7gzgtlbltx7zzrljf6m

Fault Attacks In Symmetric Key Cryptosystems [article]

Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha
2020 IACR Cryptology ePrint Archive  
This work, which covers a wide spectrum in the present day research on fault attacks that fall under the purview of the symmetric key cryptography, aims at fulfilling the absence of an up-to-date survey  ...  and going to stay as an active research interest for a foreseeable future.  ...  Generalized Fault Attack Automation Frameworks As fault attacks are becoming a more serious threat, efforts have been made to construct a generalized and automated framework that can evaluate the effectiveness  ... 
dblp:journals/iacr/BaksiBBJS20 fatcat:dln4jkk6mvb33okcmlwrkkjm54

ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers

Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta
2018 Transactions on Cryptographic Hardware and Embedded Systems  
In this paper, we propose an automation for evaluating the exploitability status of fault instances from block ciphers, mainly in the context of Differential Fault Analysis (DFA) attacks.  ...  As a proof-of-concept, we reconstruct some known attack examples on AES and PRESENT using the framework and finally analyze a recently proposed cipher GIFT [BPP+17] for the first time.  ...  Against Fault Attacks".  ... 
doi:10.13154/tches.v2018.i2.242-276 dblp:journals/tches/SahaMD18 fatcat:sbosttvpazflzmxb7xn2lt5o24

Catalog and Illustrative Examples of Lightweight Cryptographic Primitives [chapter]

Aleksandra Mileva, Vesna Dimitrova, Orhun Kara, Miodrag J. Mihaljević
2021 Security of Ubiquitous Computing Systems  
In particular, the reason behind why modern lightweight block cipher designs have in the last decade overwhelmingly dominated stream cipher design is analyzed in terms of security against tradeoff attacks  ...  cryptographic features, ultimate hardware performance, and existing security analysis, so they can easily compare the ciphers or choose some of them according to their needs.  ...  For fair and consistent evaluation and comparison of software implementations of lightweight block and stream ciphers, one can use a free and open-source benchmarking framework FELICS (Fair Evaluation  ... 
doi:10.1007/978-3-030-10591-4_2 fatcat:d2gtrxu225asnmubp5ezfloz3m

Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers

Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu
2019 Transactions on Cryptographic Hardware and Embedded Systems  
We support our design with evaluations on lightweight ciphers SIMON, SPECK, and PRIDE, and a current NIST standard, AES.  ...  This work bridges the gap by providing a fully automated way to carry out DFA on assembly implementations of symmetric block ciphers.  ...  [KRH17] recently proposed XFC -a framework for exploitable fault characterization in block ciphers. It takes a cipher specification as input and analyzes it w.r.t.  ... 
doi:10.13154/tches.v2019.i3.1-29 dblp:journals/tches/HouBZL19 fatcat:qwtjzmpndzginnuvhfnc4yulce

Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms [article]

Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu
2018 IACR Cryptology ePrint Archive  
We support our design with evaluations on lightweight ciphers SIMON, SPECK, and PRIDE, and a current NIST standard, AES.  ...  This work bridges the gap by providing a fully automated way to carry out DFA on assembly implementations of symmetric block ciphers.  ...  [ZZG + 13] Fan Zhang, Xinjie Zhao, Shize Guo, Tao Wang, and Zhijie Shi. Improved algebraic fault analysis: A case study on piccolo and applications to other lightweight block ciphers.  ... 
dblp:journals/iacr/HouBZL18 fatcat:jbpo2byyovhalc666rldbetj6m

Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey [article]

Muhammad Rana, Quazi Mamun, Rafiqul Islam
2020 arXiv   pre-print
In this paper, we discuss the state of the art lightweight cryptographic protocols for IoT networks and present a comparative analysis of the existing protocols.  ...  Additionally, we consider several recent developed block cipher and stream cipher algorithms. Furthermore, various research challenges of lightweight cryptography have been addressed.  ...  Key size, block size, structure type, and the number of rounds is the primary considerations to evaluate a lightweight block cipher.  ... 
arXiv:2010.00852v1 fatcat:mzz2bxhwcvdhbl3nlf5zbvrcgy

Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network

2018 KSII Transactions on Internet and Information Systems  
It provides a new reference for the security analysis of the same structure of the lightweight hash functions in the WBAN.  ...  As a typical lightweight cryptosystem with an extended sponge function framework, the PHOTON family is flexible to provide security for the RFID and other highly-constrained devices.  ...  This paper presents a differential fault analysis three flavors of the PHOTON family. The analysis can completely break the PHOTON-80/20/16, PHOTON-160/36/36 and PHOTON-224/32/32.  ... 
doi:10.3837/tiis.2018.01.023 fatcat:a7gpnnkabbbwbloz5fkaffh324

An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security

Rajat Sadhukhan, Sikhar Patranabis, Ashrujit Ghoshal, Debdeep Mukhopadhyay, Vishal Saraswat, Santosh Ghosh
2017 Journal of Hardware and Systems Security  
We present a uniform comparison of the performance and efficiency of these block ciphers in terms of area and power consumption, on ASIC and FPGA-based platforms.  ...  In recent years, a number of lightweight block ciphers have been proposed for encryption/decryption of data which makes such choices complex.  ...  Acknowledgements The authors would like to thank Intel Corporation, USA, for the partial funding of the work under the project "LightCrypto: Ultra-Light-weight Robust Crypto-Architectures for Performance  ... 
doi:10.1007/s41635-017-0021-2 dblp:journals/jhss/SadhukhanPGMSG17 fatcat:oxqv2z7q4bgktcmt5wwckzzfim
« Previous Showing results 1 — 15 out of 202 results