Differential Fault Attack on LEA View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2015

AUTHORS

Dirmanto Jap , Jakub Breier

ABSTRACT

LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms. In this paper we propose a Differential Fault Analysis attack on LEA. By injecting random bit faults in the last round and in the penultimate round, we were able to recover the secret key by using 258 faulty encryptions in average. If the position of faults is known, then only 62 faulty encryptions are needed in order to recover the key which surpasses the results achieved so far. More... »

PAGES

265-274

References to SciGraph publications

  • 2012. Attacking Block Ciphers in FAULT ANALYSIS IN CRYPTOGRAPHY
  • 2014. LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors in INFORMATION SECURITY APPLICATIONS
  • 2001-07-13. On the Importance of Checking Cryptographic Protocols for Faults in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’97
  • 2006-05-17. Differential fault analysis of secret key cryptosystems in ADVANCES IN CRYPTOLOGY — CRYPTO '97
  • Book

    TITLE

    Information and Communication Technology

    ISBN

    978-3-319-24314-6
    978-3-319-24315-3

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27

    DOI

    http://dx.doi.org/10.1007/978-3-319-24315-3_27

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1017812078


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "name": [
                "School of Physical and Mathematical Sciences, Nanyang Technological University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Jap", 
            "givenName": "Dirmanto", 
            "id": "sg:person.011372323045.10", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011372323045.10"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Physical Analysis and Cryptographic Engineering, Temasek Laboratories at Nanyang Technological University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Breier", 
            "givenName": "Jakub", 
            "id": "sg:person.015657656267.70", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015657656267.70"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/bfb0052259", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017540643", 
              "https://doi.org/10.1007/bfb0052259"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0052259", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017540643", 
              "https://doi.org/10.1007/bfb0052259"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-69053-0_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024405218", 
              "https://doi.org/10.1007/3-540-69053-0_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-69053-0_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024405218", 
              "https://doi.org/10.1007/3-540-69053-0_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.13089/jkiisc.2014.24.6.1117", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036343315"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-29656-7_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046503038", 
              "https://doi.org/10.1007/978-3-642-29656-7_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-05149-9_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053702235", 
              "https://doi.org/10.1007/978-3-319-05149-9_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/fdtc.2014.14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093832101"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2015", 
        "datePublishedReg": "2015-01-01", 
        "description": "LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms. In this paper we propose a Differential Fault Analysis attack on LEA. By injecting random bit faults in the last round and in the penultimate round, we were able to recover the secret key by using 258 faulty encryptions in average. If the position of faults is known, then only 62 faulty encryptions are needed in order to recover the key which surpasses the results achieved so far.", 
        "editor": [
          {
            "familyName": "Khalil", 
            "givenName": "Ismail", 
            "type": "Person"
          }, 
          {
            "familyName": "Neuhold", 
            "givenName": "Erich", 
            "type": "Person"
          }, 
          {
            "familyName": "Tjoa", 
            "givenName": "A Min", 
            "type": "Person"
          }, 
          {
            "familyName": "Xu", 
            "givenName": "Li Da", 
            "type": "Person"
          }, 
          {
            "familyName": "You", 
            "givenName": "Ilsun", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-24315-3_27", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-319-24314-6", 
            "978-3-319-24315-3"
          ], 
          "name": "Information and Communication Technology", 
          "type": "Book"
        }, 
        "name": "Differential Fault Attack on LEA", 
        "pagination": "265-274", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-24315-3_27"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "54de5e0c3ff6c8f995dc2e840a93e991cf813bcc3b3f17852ce72fe4139dcc42"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1017812078"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-24315-3_27", 
          "https://app.dimensions.ai/details/publication/pub.1017812078"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T20:42", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8687_00000584.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-24315-3_27"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-24315-3_27'


     

    This table displays all metadata directly associated to this object as RDF triples.

    115 TRIPLES      23 PREDICATES      33 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-24315-3_27 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author N522ee9a966664fadb178527cab008005
    4 schema:citation sg:pub.10.1007/3-540-69053-0_4
    5 sg:pub.10.1007/978-3-319-05149-9_1
    6 sg:pub.10.1007/978-3-642-29656-7_2
    7 sg:pub.10.1007/bfb0052259
    8 https://doi.org/10.1109/fdtc.2014.14
    9 https://doi.org/10.13089/jkiisc.2014.24.6.1117
    10 schema:datePublished 2015
    11 schema:datePublishedReg 2015-01-01
    12 schema:description LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms. In this paper we propose a Differential Fault Analysis attack on LEA. By injecting random bit faults in the last round and in the penultimate round, we were able to recover the secret key by using 258 faulty encryptions in average. If the position of faults is known, then only 62 faulty encryptions are needed in order to recover the key which surpasses the results achieved so far.
    13 schema:editor Ned182782a55142438193828ab4d97b7c
    14 schema:genre chapter
    15 schema:inLanguage en
    16 schema:isAccessibleForFree true
    17 schema:isPartOf N1589cf51f6604aa294de097a00630375
    18 schema:name Differential Fault Attack on LEA
    19 schema:pagination 265-274
    20 schema:productId N14208588dbf94207947bfe3d725f04ef
    21 Naa537fe0dbd74e4fa82b27c6d42eb7ed
    22 Nec15731a3d8e4f0f9f6aa34b52c0f135
    23 schema:publisher N3226ba314f2f4da0a4376e1aa866b12a
    24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017812078
    25 https://doi.org/10.1007/978-3-319-24315-3_27
    26 schema:sdDatePublished 2019-04-15T20:42
    27 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    28 schema:sdPublisher N74b1c33a4ae14fc89583796ae98a4dcb
    29 schema:url http://link.springer.com/10.1007/978-3-319-24315-3_27
    30 sgo:license sg:explorer/license/
    31 sgo:sdDataset chapters
    32 rdf:type schema:Chapter
    33 N05f05c0ffdbf44a59b6fa242cc1b7bec rdf:first N5056452269834bebae1a1699a1a71746
    34 rdf:rest rdf:nil
    35 N0be0a8ecf5374a08845ab7bc56ec8014 rdf:first Nf39a653c4fc147e9ad430ec41b135901
    36 rdf:rest N05f05c0ffdbf44a59b6fa242cc1b7bec
    37 N1339339da9d3482db47a0cdff7e741be schema:name School of Physical and Mathematical Sciences, Nanyang Technological University
    38 rdf:type schema:Organization
    39 N14208588dbf94207947bfe3d725f04ef schema:name dimensions_id
    40 schema:value pub.1017812078
    41 rdf:type schema:PropertyValue
    42 N1589cf51f6604aa294de097a00630375 schema:isbn 978-3-319-24314-6
    43 978-3-319-24315-3
    44 schema:name Information and Communication Technology
    45 rdf:type schema:Book
    46 N21bed8368ce44fdf93d5b6e91f19d379 rdf:first sg:person.015657656267.70
    47 rdf:rest rdf:nil
    48 N3226ba314f2f4da0a4376e1aa866b12a schema:location Cham
    49 schema:name Springer International Publishing
    50 rdf:type schema:Organisation
    51 N3b8237bcfea04cf185f214ec3d9cd9aa rdf:first Nbfeb81c763e64ed88cd869ba351aa0a3
    52 rdf:rest N9e2bdd0709ee46188549e6fb30e0d59e
    53 N5056452269834bebae1a1699a1a71746 schema:familyName You
    54 schema:givenName Ilsun
    55 rdf:type schema:Person
    56 N522ee9a966664fadb178527cab008005 rdf:first sg:person.011372323045.10
    57 rdf:rest N21bed8368ce44fdf93d5b6e91f19d379
    58 N74b1c33a4ae14fc89583796ae98a4dcb schema:name Springer Nature - SN SciGraph project
    59 rdf:type schema:Organization
    60 N85c02494d1af4dbb84153f9e85bafa34 schema:name Physical Analysis and Cryptographic Engineering, Temasek Laboratories at Nanyang Technological University
    61 rdf:type schema:Organization
    62 N9e2bdd0709ee46188549e6fb30e0d59e rdf:first Nc31d4dda1df940499561d8c7345a4524
    63 rdf:rest N0be0a8ecf5374a08845ab7bc56ec8014
    64 Naa537fe0dbd74e4fa82b27c6d42eb7ed schema:name readcube_id
    65 schema:value 54de5e0c3ff6c8f995dc2e840a93e991cf813bcc3b3f17852ce72fe4139dcc42
    66 rdf:type schema:PropertyValue
    67 Nbfeb81c763e64ed88cd869ba351aa0a3 schema:familyName Neuhold
    68 schema:givenName Erich
    69 rdf:type schema:Person
    70 Nc31d4dda1df940499561d8c7345a4524 schema:familyName Tjoa
    71 schema:givenName A Min
    72 rdf:type schema:Person
    73 Ne39d0f95739a4dcbae3832b66d56dfed schema:familyName Khalil
    74 schema:givenName Ismail
    75 rdf:type schema:Person
    76 Nec15731a3d8e4f0f9f6aa34b52c0f135 schema:name doi
    77 schema:value 10.1007/978-3-319-24315-3_27
    78 rdf:type schema:PropertyValue
    79 Ned182782a55142438193828ab4d97b7c rdf:first Ne39d0f95739a4dcbae3832b66d56dfed
    80 rdf:rest N3b8237bcfea04cf185f214ec3d9cd9aa
    81 Nf39a653c4fc147e9ad430ec41b135901 schema:familyName Xu
    82 schema:givenName Li Da
    83 rdf:type schema:Person
    84 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    85 schema:name Information and Computing Sciences
    86 rdf:type schema:DefinedTerm
    87 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    88 schema:name Computer Software
    89 rdf:type schema:DefinedTerm
    90 sg:person.011372323045.10 schema:affiliation N1339339da9d3482db47a0cdff7e741be
    91 schema:familyName Jap
    92 schema:givenName Dirmanto
    93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011372323045.10
    94 rdf:type schema:Person
    95 sg:person.015657656267.70 schema:affiliation N85c02494d1af4dbb84153f9e85bafa34
    96 schema:familyName Breier
    97 schema:givenName Jakub
    98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015657656267.70
    99 rdf:type schema:Person
    100 sg:pub.10.1007/3-540-69053-0_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024405218
    101 https://doi.org/10.1007/3-540-69053-0_4
    102 rdf:type schema:CreativeWork
    103 sg:pub.10.1007/978-3-319-05149-9_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053702235
    104 https://doi.org/10.1007/978-3-319-05149-9_1
    105 rdf:type schema:CreativeWork
    106 sg:pub.10.1007/978-3-642-29656-7_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046503038
    107 https://doi.org/10.1007/978-3-642-29656-7_2
    108 rdf:type schema:CreativeWork
    109 sg:pub.10.1007/bfb0052259 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017540643
    110 https://doi.org/10.1007/bfb0052259
    111 rdf:type schema:CreativeWork
    112 https://doi.org/10.1109/fdtc.2014.14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093832101
    113 rdf:type schema:CreativeWork
    114 https://doi.org/10.13089/jkiisc.2014.24.6.1117 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036343315
    115 rdf:type schema:CreativeWork
     




    Preview window. Press ESC to close (or click here)


    ...