Springer Nature - SN SciGraph project
doi
10.1007/978-3-642-29656-7_2
https://scigraph.springernature.com/explorer/license/
chapters
false
Attacking Block Ciphers
chapter
http://link.springer.com/10.1007/978-3-642-29656-7_2
2012-01-01
2012
Differential Fault Analysis (DFA) was one of the earliest techniques invented to attack block ciphers by provoking a computational error. In the basic DFA scenario the adversary obtains a pair of ciphertexts both of which encrypt the same plaintext. One of these ciphertexts is the correct result while the other is an erroneous one resulting from a faulty computation. Though applications of DFA to DES and AES have proven to be quite effective, other techniques have also been invented which can threaten block ciphers in different ways. This chapter presents some of these fault analysis methods, including Collision Fault Analysis (CFA) and its close variant Ineffective Fault Analysis (IFA). These methods depart from DFA by the fault model they rely on, by their ability to defeat classical countermeasures against DFA or DPA, or by their application to specific implementations.
19-35
en
2019-04-16T00:38
978-3-642-29655-0
978-3-642-29656-7
Fault Analysis in Cryptography
Christophe
Clavier
Tunstall
Michael
Computation Theory and Mathematics
Information and Computing Sciences
Springer Berlin Heidelberg
Berlin, Heidelberg
dimensions_id
pub.1046503038
XLIM (UMR 6172), Université de Limoges, Limoges, France
XLIM
Marc
Joye
readcube_id
dd85b2e6de7d2b263d72b127f4cb0e4d91772798c5bd398c3503294e623ba154