Attacking Block Ciphers View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2012

AUTHORS

Christophe Clavier

ABSTRACT

Differential Fault Analysis (DFA) was one of the earliest techniques invented to attack block ciphers by provoking a computational error. In the basic DFA scenario the adversary obtains a pair of ciphertexts both of which encrypt the same plaintext. One of these ciphertexts is the correct result while the other is an erroneous one resulting from a faulty computation. Though applications of DFA to DES and AES have proven to be quite effective, other techniques have also been invented which can threaten block ciphers in different ways. This chapter presents some of these fault analysis methods, including Collision Fault Analysis (CFA) and its close variant Ineffective Fault Analysis (IFA). These methods depart from DFA by the fault model they rely on, by their ability to defeat classical countermeasures against DFA or DPA, or by their application to specific implementations. More... »

PAGES

19-35

Book

TITLE

Fault Analysis in Cryptography

ISBN

978-3-642-29655-0
978-3-642-29656-7

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-29656-7_2

DOI

http://dx.doi.org/10.1007/978-3-642-29656-7_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1046503038


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "XLIM", 
          "id": "https://www.grid.ac/institutes/grid.462736.2", 
          "name": [
            "XLIM (UMR 6172), Universit\u00e9 de Limoges, Limoges, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Clavier", 
        "givenName": "Christophe", 
        "id": "sg:person.07562566165.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07562566165.07"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "Differential Fault Analysis (DFA) was one of the earliest techniques invented to attack block ciphers by provoking a computational error. In the basic DFA scenario the adversary obtains a pair of ciphertexts both of which encrypt the same plaintext. One of these ciphertexts is the correct result while the other is an erroneous one resulting from a faulty computation. Though applications of DFA to DES and AES have proven to be quite effective, other techniques have also been invented which can threaten block ciphers in different ways. This chapter presents some of these fault analysis methods, including Collision Fault Analysis (CFA) and its close variant Ineffective Fault Analysis (IFA). These methods depart from DFA by the fault model they rely on, by their ability to defeat classical countermeasures against DFA or DPA, or by their application to specific implementations.", 
    "editor": [
      {
        "familyName": "Joye", 
        "givenName": "Marc", 
        "type": "Person"
      }, 
      {
        "familyName": "Tunstall", 
        "givenName": "Michael", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-29656-7_2", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-29655-0", 
        "978-3-642-29656-7"
      ], 
      "name": "Fault Analysis in Cryptography", 
      "type": "Book"
    }, 
    "name": "Attacking Block Ciphers", 
    "pagination": "19-35", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-29656-7_2"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "dd85b2e6de7d2b263d72b127f4cb0e4d91772798c5bd398c3503294e623ba154"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1046503038"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-29656-7_2", 
      "https://app.dimensions.ai/details/publication/pub.1046503038"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T00:38", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8700_00000080.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-642-29656-7_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29656-7_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29656-7_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29656-7_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29656-7_2'


 

This table displays all metadata directly associated to this object as RDF triples.

70 TRIPLES      22 PREDICATES      27 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-29656-7_2 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author Ne1646efc8755433098fabcda22890fb7
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description Differential Fault Analysis (DFA) was one of the earliest techniques invented to attack block ciphers by provoking a computational error. In the basic DFA scenario the adversary obtains a pair of ciphertexts both of which encrypt the same plaintext. One of these ciphertexts is the correct result while the other is an erroneous one resulting from a faulty computation. Though applications of DFA to DES and AES have proven to be quite effective, other techniques have also been invented which can threaten block ciphers in different ways. This chapter presents some of these fault analysis methods, including Collision Fault Analysis (CFA) and its close variant Ineffective Fault Analysis (IFA). These methods depart from DFA by the fault model they rely on, by their ability to defeat classical countermeasures against DFA or DPA, or by their application to specific implementations.
7 schema:editor N3f888fa921c8438980b010d975e8470d
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N82c947afd6174459bafaf5037e31f13e
12 schema:name Attacking Block Ciphers
13 schema:pagination 19-35
14 schema:productId N71552d6b274d47948e96136d3661b4b9
15 Nea7dd64f6d3c46978980d37fde74cd0a
16 Nf8e753336b99411082afef06b8b61a8e
17 schema:publisher Nda88b8d5630644c89b492e26158f7531
18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046503038
19 https://doi.org/10.1007/978-3-642-29656-7_2
20 schema:sdDatePublished 2019-04-16T00:38
21 schema:sdLicense https://scigraph.springernature.com/explorer/license/
22 schema:sdPublisher N64dfccdc202c4e9b8d8ebcf2c5f7771a
23 schema:url http://link.springer.com/10.1007/978-3-642-29656-7_2
24 sgo:license sg:explorer/license/
25 sgo:sdDataset chapters
26 rdf:type schema:Chapter
27 N1b9fe77ae3ba42669fd1d0a9493c79fb rdf:first N811a3394da4c4e7a8fe98fb5a20b6fce
28 rdf:rest rdf:nil
29 N3f888fa921c8438980b010d975e8470d rdf:first Nefe358d16cc7452785b38a09ad96d7aa
30 rdf:rest N1b9fe77ae3ba42669fd1d0a9493c79fb
31 N64dfccdc202c4e9b8d8ebcf2c5f7771a schema:name Springer Nature - SN SciGraph project
32 rdf:type schema:Organization
33 N71552d6b274d47948e96136d3661b4b9 schema:name dimensions_id
34 schema:value pub.1046503038
35 rdf:type schema:PropertyValue
36 N811a3394da4c4e7a8fe98fb5a20b6fce schema:familyName Tunstall
37 schema:givenName Michael
38 rdf:type schema:Person
39 N82c947afd6174459bafaf5037e31f13e schema:isbn 978-3-642-29655-0
40 978-3-642-29656-7
41 schema:name Fault Analysis in Cryptography
42 rdf:type schema:Book
43 Nda88b8d5630644c89b492e26158f7531 schema:location Berlin, Heidelberg
44 schema:name Springer Berlin Heidelberg
45 rdf:type schema:Organisation
46 Ne1646efc8755433098fabcda22890fb7 rdf:first sg:person.07562566165.07
47 rdf:rest rdf:nil
48 Nea7dd64f6d3c46978980d37fde74cd0a schema:name doi
49 schema:value 10.1007/978-3-642-29656-7_2
50 rdf:type schema:PropertyValue
51 Nefe358d16cc7452785b38a09ad96d7aa schema:familyName Joye
52 schema:givenName Marc
53 rdf:type schema:Person
54 Nf8e753336b99411082afef06b8b61a8e schema:name readcube_id
55 schema:value dd85b2e6de7d2b263d72b127f4cb0e4d91772798c5bd398c3503294e623ba154
56 rdf:type schema:PropertyValue
57 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
58 schema:name Information and Computing Sciences
59 rdf:type schema:DefinedTerm
60 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
61 schema:name Computation Theory and Mathematics
62 rdf:type schema:DefinedTerm
63 sg:person.07562566165.07 schema:affiliation https://www.grid.ac/institutes/grid.462736.2
64 schema:familyName Clavier
65 schema:givenName Christophe
66 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07562566165.07
67 rdf:type schema:Person
68 https://www.grid.ac/institutes/grid.462736.2 schema:alternateName XLIM
69 schema:name XLIM (UMR 6172), Université de Limoges, Limoges, France
70 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...