2015
AUTHORS ABSTRACTLEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms. In this paper we propose a Differential Fault Analysis attack on LEA. By injecting random bit faults in the last round and in the penultimate round, we were able to recover the secret key by using 258 faulty encryptions in average. If the position of faults is known, then only 62 faulty encryptions are needed in order to recover the key which surpasses the results achieved so far. More... »
PAGES265-274
Information and Communication Technology
ISBN
978-3-319-24314-6
978-3-319-24315-3
http://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27
DOIhttp://dx.doi.org/10.1007/978-3-319-24315-3_27
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1017812078
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computer Software",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"name": [
"School of Physical and Mathematical Sciences, Nanyang Technological University"
],
"type": "Organization"
},
"familyName": "Jap",
"givenName": "Dirmanto",
"id": "sg:person.011372323045.10",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011372323045.10"
],
"type": "Person"
},
{
"affiliation": {
"name": [
"Physical Analysis and Cryptographic Engineering, Temasek Laboratories at Nanyang Technological University"
],
"type": "Organization"
},
"familyName": "Breier",
"givenName": "Jakub",
"id": "sg:person.015657656267.70",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015657656267.70"
],
"type": "Person"
}
],
"citation": [
{
"id": "sg:pub.10.1007/bfb0052259",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1017540643",
"https://doi.org/10.1007/bfb0052259"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/bfb0052259",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1017540643",
"https://doi.org/10.1007/bfb0052259"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-69053-0_4",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1024405218",
"https://doi.org/10.1007/3-540-69053-0_4"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-69053-0_4",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1024405218",
"https://doi.org/10.1007/3-540-69053-0_4"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.13089/jkiisc.2014.24.6.1117",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1036343315"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-29656-7_2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1046503038",
"https://doi.org/10.1007/978-3-642-29656-7_2"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-319-05149-9_1",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1053702235",
"https://doi.org/10.1007/978-3-319-05149-9_1"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/fdtc.2014.14",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1093832101"
],
"type": "CreativeWork"
}
],
"datePublished": "2015",
"datePublishedReg": "2015-01-01",
"description": "LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms. In this paper we propose a Differential Fault Analysis attack on LEA. By injecting random bit faults in the last round and in the penultimate round, we were able to recover the secret key by using 258 faulty encryptions in average. If the position of faults is known, then only 62 faulty encryptions are needed in order to recover the key which surpasses the results achieved so far.",
"editor": [
{
"familyName": "Khalil",
"givenName": "Ismail",
"type": "Person"
},
{
"familyName": "Neuhold",
"givenName": "Erich",
"type": "Person"
},
{
"familyName": "Tjoa",
"givenName": "A Min",
"type": "Person"
},
{
"familyName": "Xu",
"givenName": "Li Da",
"type": "Person"
},
{
"familyName": "You",
"givenName": "Ilsun",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-319-24315-3_27",
"inLanguage": [
"en"
],
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-3-319-24314-6",
"978-3-319-24315-3"
],
"name": "Information and Communication Technology",
"type": "Book"
},
"name": "Differential Fault Attack on LEA",
"pagination": "265-274",
"productId": [
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-319-24315-3_27"
]
},
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"54de5e0c3ff6c8f995dc2e840a93e991cf813bcc3b3f17852ce72fe4139dcc42"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1017812078"
]
}
],
"publisher": {
"location": "Cham",
"name": "Springer International Publishing",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-319-24315-3_27",
"https://app.dimensions.ai/details/publication/pub.1017812078"
],
"sdDataset": "chapters",
"sdDatePublished": "2019-04-15T20:42",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8687_00000584.jsonl",
"type": "Chapter",
"url": "http://link.springer.com/10.1007/978-3-319-24315-3_27"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'
This table displays all metadata directly associated to this object as RDF triples.
115 TRIPLES
23 PREDICATES
33 URIs
20 LITERALS
8 BLANK NODES