Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/88742
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Patranabis, Sikhar | en |
dc.contributor.author | Mukhopadhyay, Debdeep | en |
dc.contributor.author | Breier, Jakub | en |
dc.contributor.author | Bhasin, Shivam | en |
dc.date.accessioned | 2018-05-03T04:22:38Z | en |
dc.date.accessioned | 2019-12-06T17:09:59Z | - |
dc.date.available | 2018-05-03T04:22:38Z | en |
dc.date.available | 2019-12-06T17:09:59Z | - |
dc.date.copyright | 2017-12-01 | en |
dc.date.issued | 2017 | en |
dc.identifier.citation | Patranabis, S., Mukhopadhyay, D., Breier, J., & Bhasin, S. (2017). One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers. 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 25-32. | en |
dc.identifier.uri | https://hdl.handle.net/10356/88742 | - |
dc.description.abstract | We present the first practically realizable sidechannel assisted fault attack on PRESENT, that can retrieve the last round key efficiently using single nibble faults. The attack demonstrates how side-channel leakage can allow the adversary to precisely determine the fault mask resulting from a nibble fault injection instance. We first demonstrate the viability of such an attack model via side-channel analysis experiments on top of a laser-based fault injection setup, targeting a PRESENT-80 implementation on an ATmega328P microcontroller. Subsequently, we present a differential fault analysis (DFA) exploiting the knowledge of the output fault mask in the target round to recover multiple last round key nibbles independently and in parallel. Both analytically and through experimental evidence, we show that the combined attack can recover the last round key of PRESENT with 4 random nibble fault injections in the best case, and around 7- 8 nibble fault injections in the average case. Our attack sheds light on a hitherto unexplored vulnerability of PRESENT and PRESENT-like block ciphers that use bit-permutations instead of maximum distance separable (MDS) layers for diffusion. | en |
dc.format.extent | 8 p. | en |
dc.language.iso | en | en |
dc.rights | © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/FDTC.2017.11]. | en |
dc.subject | DPA | en |
dc.subject | DFA | en |
dc.title | One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers | en |
dc.type | Conference Paper | en |
dc.contributor.conference | 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) | en |
dc.contributor.research | Temasek Laboratories | en |
dc.identifier.doi | 10.1109/FDTC.2017.11 | en |
dc.description.version | Accepted version | en |
dc.identifier.rims | 206825 | en |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
Appears in Collections: | TL Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
SCA+DFA.pdf | 1.72 MB | Adobe PDF | ![]() View/Open |
SCOPUSTM
Citations
20
9
Updated on Mar 8, 2021
PublonsTM
Citations
20
6
Updated on Mar 9, 2021
Page view(s)
310
Updated on May 23, 2022
Download(s) 50
134
Updated on May 23, 2022
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.