Differential Fault Attack on LEA View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2015

AUTHORS

Dirmanto Jap , Jakub Breier

ABSTRACT

LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms. In this paper we propose a Differential Fault Analysis attack on LEA. By injecting random bit faults in the last round and in the penultimate round, we were able to recover the secret key by using 258 faulty encryptions in average. If the position of faults is known, then only 62 faulty encryptions are needed in order to recover the key which surpasses the results achieved so far. More... »

PAGES

265-274

References to SciGraph publications

  • 2012. Attacking Block Ciphers in FAULT ANALYSIS IN CRYPTOGRAPHY
  • 2014. LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors in INFORMATION SECURITY APPLICATIONS
  • 2001-07-13. On the Importance of Checking Cryptographic Protocols for Faults in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’97
  • 2006-05-17. Differential fault analysis of secret key cryptosystems in ADVANCES IN CRYPTOLOGY — CRYPTO '97
  • Book

    TITLE

    Information and Communication Technology

    ISBN

    978-3-319-24314-6
    978-3-319-24315-3

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27

    DOI

    http://dx.doi.org/10.1007/978-3-319-24315-3_27

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1017812078


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "name": [
                "School of Physical and Mathematical Sciences, Nanyang Technological University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Jap", 
            "givenName": "Dirmanto", 
            "id": "sg:person.011372323045.10", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011372323045.10"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Physical Analysis and Cryptographic Engineering, Temasek Laboratories at Nanyang Technological University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Breier", 
            "givenName": "Jakub", 
            "id": "sg:person.015657656267.70", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015657656267.70"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/bfb0052259", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017540643", 
              "https://doi.org/10.1007/bfb0052259"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0052259", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017540643", 
              "https://doi.org/10.1007/bfb0052259"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-69053-0_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024405218", 
              "https://doi.org/10.1007/3-540-69053-0_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-69053-0_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024405218", 
              "https://doi.org/10.1007/3-540-69053-0_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.13089/jkiisc.2014.24.6.1117", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036343315"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-29656-7_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046503038", 
              "https://doi.org/10.1007/978-3-642-29656-7_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-05149-9_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053702235", 
              "https://doi.org/10.1007/978-3-319-05149-9_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/fdtc.2014.14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093832101"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2015", 
        "datePublishedReg": "2015-01-01", 
        "description": "LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms. In this paper we propose a Differential Fault Analysis attack on LEA. By injecting random bit faults in the last round and in the penultimate round, we were able to recover the secret key by using 258 faulty encryptions in average. If the position of faults is known, then only 62 faulty encryptions are needed in order to recover the key which surpasses the results achieved so far.", 
        "editor": [
          {
            "familyName": "Khalil", 
            "givenName": "Ismail", 
            "type": "Person"
          }, 
          {
            "familyName": "Neuhold", 
            "givenName": "Erich", 
            "type": "Person"
          }, 
          {
            "familyName": "Tjoa", 
            "givenName": "A Min", 
            "type": "Person"
          }, 
          {
            "familyName": "Xu", 
            "givenName": "Li Da", 
            "type": "Person"
          }, 
          {
            "familyName": "You", 
            "givenName": "Ilsun", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-24315-3_27", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-319-24314-6", 
            "978-3-319-24315-3"
          ], 
          "name": "Information and Communication Technology", 
          "type": "Book"
        }, 
        "name": "Differential Fault Attack on LEA", 
        "pagination": "265-274", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-24315-3_27"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "54de5e0c3ff6c8f995dc2e840a93e991cf813bcc3b3f17852ce72fe4139dcc42"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1017812078"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-24315-3_27", 
          "https://app.dimensions.ai/details/publication/pub.1017812078"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T20:42", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8687_00000584.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-24315-3_27"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'


     

    This table displays all metadata directly associated to this object as RDF triples.

    115 TRIPLES      23 PREDICATES      33 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-24315-3_27 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author Nfdc03d0ba6064acb8fa180b99e949f6a
    4 schema:citation sg:pub.10.1007/3-540-69053-0_4
    5 sg:pub.10.1007/978-3-319-05149-9_1
    6 sg:pub.10.1007/978-3-642-29656-7_2
    7 sg:pub.10.1007/bfb0052259
    8 https://doi.org/10.1109/fdtc.2014.14
    9 https://doi.org/10.13089/jkiisc.2014.24.6.1117
    10 schema:datePublished 2015
    11 schema:datePublishedReg 2015-01-01
    12 schema:description LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms. In this paper we propose a Differential Fault Analysis attack on LEA. By injecting random bit faults in the last round and in the penultimate round, we were able to recover the secret key by using 258 faulty encryptions in average. If the position of faults is known, then only 62 faulty encryptions are needed in order to recover the key which surpasses the results achieved so far.
    13 schema:editor N64a89f0083b6423eb240d8e92b280a1a
    14 schema:genre chapter
    15 schema:inLanguage en
    16 schema:isAccessibleForFree true
    17 schema:isPartOf Nf0d187250fa84d89939c8ec8af759d6f
    18 schema:name Differential Fault Attack on LEA
    19 schema:pagination 265-274
    20 schema:productId N5ab601935c274591bab1efd247239410
    21 Ncba04bdd9fcb4f339570d0fa127a044d
    22 Nf1c9bae48c264ded9ba9b0333c62c878
    23 schema:publisher Nb54da2773d884587b4388633fc3c291e
    24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017812078
    25 https://doi.org/10.1007/978-3-319-24315-3_27
    26 schema:sdDatePublished 2019-04-15T20:42
    27 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    28 schema:sdPublisher Nabef202a69934faaa1d905c67a7458e8
    29 schema:url http://link.springer.com/10.1007/978-3-319-24315-3_27
    30 sgo:license sg:explorer/license/
    31 sgo:sdDataset chapters
    32 rdf:type schema:Chapter
    33 N469d3cb4e97a4245a4a7f9f0cc4cbb0a rdf:first sg:person.015657656267.70
    34 rdf:rest rdf:nil
    35 N5ab601935c274591bab1efd247239410 schema:name doi
    36 schema:value 10.1007/978-3-319-24315-3_27
    37 rdf:type schema:PropertyValue
    38 N5d2cd3cae9434abc9a61eb89ab710cfe rdf:first N79fbc9854a4046ff8cafd30f826b1300
    39 rdf:rest N9518a520b92240bd84798d4c2f896e2a
    40 N5f67e77f4c0b45c998fb480656394d8a schema:name Physical Analysis and Cryptographic Engineering, Temasek Laboratories at Nanyang Technological University
    41 rdf:type schema:Organization
    42 N64a89f0083b6423eb240d8e92b280a1a rdf:first Nf5d41a41cc044b28a3d4654548e77da4
    43 rdf:rest Nd5bc3094a7354764b07b498299f75f61
    44 N69e109ef011344daab915652e49b5bf3 schema:familyName Neuhold
    45 schema:givenName Erich
    46 rdf:type schema:Person
    47 N79fbc9854a4046ff8cafd30f826b1300 schema:familyName Tjoa
    48 schema:givenName A Min
    49 rdf:type schema:Person
    50 N9518a520b92240bd84798d4c2f896e2a rdf:first Nbeaf01d031c540ea939be5f51a9a254f
    51 rdf:rest Nb4425f177c15426db84224b94baca5a5
    52 Nabef202a69934faaa1d905c67a7458e8 schema:name Springer Nature - SN SciGraph project
    53 rdf:type schema:Organization
    54 Nb4425f177c15426db84224b94baca5a5 rdf:first Ndecc1d69b06248ba945ff94e9134e29c
    55 rdf:rest rdf:nil
    56 Nb54da2773d884587b4388633fc3c291e schema:location Cham
    57 schema:name Springer International Publishing
    58 rdf:type schema:Organisation
    59 Nbeaf01d031c540ea939be5f51a9a254f schema:familyName Xu
    60 schema:givenName Li Da
    61 rdf:type schema:Person
    62 Ncba04bdd9fcb4f339570d0fa127a044d schema:name dimensions_id
    63 schema:value pub.1017812078
    64 rdf:type schema:PropertyValue
    65 Nd5bc3094a7354764b07b498299f75f61 rdf:first N69e109ef011344daab915652e49b5bf3
    66 rdf:rest N5d2cd3cae9434abc9a61eb89ab710cfe
    67 Ndecc1d69b06248ba945ff94e9134e29c schema:familyName You
    68 schema:givenName Ilsun
    69 rdf:type schema:Person
    70 Nf0d187250fa84d89939c8ec8af759d6f schema:isbn 978-3-319-24314-6
    71 978-3-319-24315-3
    72 schema:name Information and Communication Technology
    73 rdf:type schema:Book
    74 Nf1c9bae48c264ded9ba9b0333c62c878 schema:name readcube_id
    75 schema:value 54de5e0c3ff6c8f995dc2e840a93e991cf813bcc3b3f17852ce72fe4139dcc42
    76 rdf:type schema:PropertyValue
    77 Nf5d41a41cc044b28a3d4654548e77da4 schema:familyName Khalil
    78 schema:givenName Ismail
    79 rdf:type schema:Person
    80 Nf6d27a5412444b5b929180dd4baf730b schema:name School of Physical and Mathematical Sciences, Nanyang Technological University
    81 rdf:type schema:Organization
    82 Nfdc03d0ba6064acb8fa180b99e949f6a rdf:first sg:person.011372323045.10
    83 rdf:rest N469d3cb4e97a4245a4a7f9f0cc4cbb0a
    84 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    85 schema:name Information and Computing Sciences
    86 rdf:type schema:DefinedTerm
    87 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    88 schema:name Computer Software
    89 rdf:type schema:DefinedTerm
    90 sg:person.011372323045.10 schema:affiliation Nf6d27a5412444b5b929180dd4baf730b
    91 schema:familyName Jap
    92 schema:givenName Dirmanto
    93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011372323045.10
    94 rdf:type schema:Person
    95 sg:person.015657656267.70 schema:affiliation N5f67e77f4c0b45c998fb480656394d8a
    96 schema:familyName Breier
    97 schema:givenName Jakub
    98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015657656267.70
    99 rdf:type schema:Person
    100 sg:pub.10.1007/3-540-69053-0_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024405218
    101 https://doi.org/10.1007/3-540-69053-0_4
    102 rdf:type schema:CreativeWork
    103 sg:pub.10.1007/978-3-319-05149-9_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053702235
    104 https://doi.org/10.1007/978-3-319-05149-9_1
    105 rdf:type schema:CreativeWork
    106 sg:pub.10.1007/978-3-642-29656-7_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046503038
    107 https://doi.org/10.1007/978-3-642-29656-7_2
    108 rdf:type schema:CreativeWork
    109 sg:pub.10.1007/bfb0052259 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017540643
    110 https://doi.org/10.1007/bfb0052259
    111 rdf:type schema:CreativeWork
    112 https://doi.org/10.1109/fdtc.2014.14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093832101
    113 rdf:type schema:CreativeWork
    114 https://doi.org/10.13089/jkiisc.2014.24.6.1117 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036343315
    115 rdf:type schema:CreativeWork
     




    Preview window. Press ESC to close (or click here)


    ...