Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/88733
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumar, S. V. Dilipen
dc.contributor.authorPatranabis, Sikharen
dc.contributor.authorBreier, Jakuben
dc.contributor.authorMukhopadhyay, Debdeepen
dc.contributor.authorBhasin, Shivamen
dc.contributor.authorChattopadhyay, Anupamen
dc.contributor.authorBaksi, Anubhaben
dc.date.accessioned2018-05-03T05:03:34Zen
dc.date.accessioned2019-12-06T17:09:49Z-
dc.date.available2018-05-03T05:03:34Zen
dc.date.available2019-12-06T17:09:49Z-
dc.date.copyright2017-12-01en
dc.date.issued2017en
dc.identifier.citationKumar, S. V. D., Patranabis, S., Breier, J., Mukhopadhyay, D., Bhasin, S., Chattopadhyay, A., et al. (2017). A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20. 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, 33-40.en
dc.identifier.urihttps://hdl.handle.net/10356/88733-
dc.description.abstractThis paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (ARX)-based stream ciphers. ChaCha has recently been deployed for speeding up and strengthening HTTPS connections for Google Chrome on Android devices. In this paper, we propose differential fault analysis attacks on ChaCha without resorting to nonce misuse. We use the instruction skip and instruction replacement fault models, which are popularly mounted on microcontroller-based cryptographic implementations. We corroborate the attack propositions via practical fault injection experiments using a laser-based setup targeting an Atmel AVR 8-bit microcontroller-based implementation of ChaCha. Each of the proposed attacks can be repeated with 100% accuracy in our fault injection setup, and can recover the entire 256 bit secret key using 5-8 fault injections on an average.en
dc.format.extent8 p.en
dc.language.isoenen
dc.rights© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/FDTC.2017.14].en
dc.subjectChaChaen
dc.subjectARX Cipheren
dc.titleA Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20en
dc.typeConference Paperen
dc.contributor.schoolSchool of Computer Science and Engineeringen
dc.contributor.conference2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)en
dc.contributor.researchTemasek Laboratoriesen
dc.identifier.doi10.1109/FDTC.2017.14en
dc.description.versionAccepted versionen
dc.identifier.rims206826en
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:SCSE Conference Papers
Files in This Item:
File Description SizeFormat 
bare_conf.pdf314.64 kBAdobe PDFThumbnail
View/Open

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.