Attacking Block Ciphers View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2012

AUTHORS

Christophe Clavier

ABSTRACT

Differential Fault Analysis (DFA) was one of the earliest techniques invented to attack block ciphers by provoking a computational error. In the basic DFA scenario the adversary obtains a pair of ciphertexts both of which encrypt the same plaintext. One of these ciphertexts is the correct result while the other is an erroneous one resulting from a faulty computation. Though applications of DFA to DES and AES have proven to be quite effective, other techniques have also been invented which can threaten block ciphers in different ways. This chapter presents some of these fault analysis methods, including Collision Fault Analysis (CFA) and its close variant Ineffective Fault Analysis (IFA). These methods depart from DFA by the fault model they rely on, by their ability to defeat classical countermeasures against DFA or DPA, or by their application to specific implementations. More... »

PAGES

19-35

Book

TITLE

Fault Analysis in Cryptography

ISBN

978-3-642-29655-0
978-3-642-29656-7

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-29656-7_2

DOI

http://dx.doi.org/10.1007/978-3-642-29656-7_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1046503038


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "XLIM", 
          "id": "https://www.grid.ac/institutes/grid.462736.2", 
          "name": [
            "XLIM (UMR 6172), Universit\u00e9 de Limoges, Limoges, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Clavier", 
        "givenName": "Christophe", 
        "id": "sg:person.07562566165.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07562566165.07"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "Differential Fault Analysis (DFA) was one of the earliest techniques invented to attack block ciphers by provoking a computational error. In the basic DFA scenario the adversary obtains a pair of ciphertexts both of which encrypt the same plaintext. One of these ciphertexts is the correct result while the other is an erroneous one resulting from a faulty computation. Though applications of DFA to DES and AES have proven to be quite effective, other techniques have also been invented which can threaten block ciphers in different ways. This chapter presents some of these fault analysis methods, including Collision Fault Analysis (CFA) and its close variant Ineffective Fault Analysis (IFA). These methods depart from DFA by the fault model they rely on, by their ability to defeat classical countermeasures against DFA or DPA, or by their application to specific implementations.", 
    "editor": [
      {
        "familyName": "Joye", 
        "givenName": "Marc", 
        "type": "Person"
      }, 
      {
        "familyName": "Tunstall", 
        "givenName": "Michael", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-29656-7_2", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-29655-0", 
        "978-3-642-29656-7"
      ], 
      "name": "Fault Analysis in Cryptography", 
      "type": "Book"
    }, 
    "name": "Attacking Block Ciphers", 
    "pagination": "19-35", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-29656-7_2"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "dd85b2e6de7d2b263d72b127f4cb0e4d91772798c5bd398c3503294e623ba154"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1046503038"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-29656-7_2", 
      "https://app.dimensions.ai/details/publication/pub.1046503038"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T00:38", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8700_00000080.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-642-29656-7_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29656-7_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29656-7_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29656-7_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29656-7_2'


 

This table displays all metadata directly associated to this object as RDF triples.

70 TRIPLES      22 PREDICATES      27 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-29656-7_2 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author N9fe2e295d7bc492ebe751f8c81b15fac
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description Differential Fault Analysis (DFA) was one of the earliest techniques invented to attack block ciphers by provoking a computational error. In the basic DFA scenario the adversary obtains a pair of ciphertexts both of which encrypt the same plaintext. One of these ciphertexts is the correct result while the other is an erroneous one resulting from a faulty computation. Though applications of DFA to DES and AES have proven to be quite effective, other techniques have also been invented which can threaten block ciphers in different ways. This chapter presents some of these fault analysis methods, including Collision Fault Analysis (CFA) and its close variant Ineffective Fault Analysis (IFA). These methods depart from DFA by the fault model they rely on, by their ability to defeat classical countermeasures against DFA or DPA, or by their application to specific implementations.
7 schema:editor Nf371f9c2cd4a408b8cb76ff7f1ffbd81
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nf8764dbe2bf54aa5bb9aac9ea7256676
12 schema:name Attacking Block Ciphers
13 schema:pagination 19-35
14 schema:productId N110d45a045674f7c9c271e131ff0ff70
15 N6e75ec64ba27480882fb58337e06286b
16 Nf2f29a17abbd4902bc06b9efb23de48f
17 schema:publisher Nc09d00db68604f0cb4410aa3ce6abcc8
18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046503038
19 https://doi.org/10.1007/978-3-642-29656-7_2
20 schema:sdDatePublished 2019-04-16T00:38
21 schema:sdLicense https://scigraph.springernature.com/explorer/license/
22 schema:sdPublisher N2fd4a760673144018e9ca4313a3f4ec5
23 schema:url http://link.springer.com/10.1007/978-3-642-29656-7_2
24 sgo:license sg:explorer/license/
25 sgo:sdDataset chapters
26 rdf:type schema:Chapter
27 N035f18f019584a73b66452ba929f10b0 rdf:first N62e7626a614a4afaa684e75ba66f9332
28 rdf:rest rdf:nil
29 N110d45a045674f7c9c271e131ff0ff70 schema:name readcube_id
30 schema:value dd85b2e6de7d2b263d72b127f4cb0e4d91772798c5bd398c3503294e623ba154
31 rdf:type schema:PropertyValue
32 N2fd4a760673144018e9ca4313a3f4ec5 schema:name Springer Nature - SN SciGraph project
33 rdf:type schema:Organization
34 N62e7626a614a4afaa684e75ba66f9332 schema:familyName Tunstall
35 schema:givenName Michael
36 rdf:type schema:Person
37 N6e75ec64ba27480882fb58337e06286b schema:name dimensions_id
38 schema:value pub.1046503038
39 rdf:type schema:PropertyValue
40 N9fe2e295d7bc492ebe751f8c81b15fac rdf:first sg:person.07562566165.07
41 rdf:rest rdf:nil
42 Nc09d00db68604f0cb4410aa3ce6abcc8 schema:location Berlin, Heidelberg
43 schema:name Springer Berlin Heidelberg
44 rdf:type schema:Organisation
45 Nc2e477d529a54ab19e6a31fea19ae8bc schema:familyName Joye
46 schema:givenName Marc
47 rdf:type schema:Person
48 Nf2f29a17abbd4902bc06b9efb23de48f schema:name doi
49 schema:value 10.1007/978-3-642-29656-7_2
50 rdf:type schema:PropertyValue
51 Nf371f9c2cd4a408b8cb76ff7f1ffbd81 rdf:first Nc2e477d529a54ab19e6a31fea19ae8bc
52 rdf:rest N035f18f019584a73b66452ba929f10b0
53 Nf8764dbe2bf54aa5bb9aac9ea7256676 schema:isbn 978-3-642-29655-0
54 978-3-642-29656-7
55 schema:name Fault Analysis in Cryptography
56 rdf:type schema:Book
57 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
58 schema:name Information and Computing Sciences
59 rdf:type schema:DefinedTerm
60 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
61 schema:name Computation Theory and Mathematics
62 rdf:type schema:DefinedTerm
63 sg:person.07562566165.07 schema:affiliation https://www.grid.ac/institutes/grid.462736.2
64 schema:familyName Clavier
65 schema:givenName Christophe
66 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07562566165.07
67 rdf:type schema:Person
68 https://www.grid.ac/institutes/grid.462736.2 schema:alternateName XLIM
69 schema:name XLIM (UMR 6172), Université de Limoges, Limoges, France
70 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...