Protecting block ciphers against differential fault attacks without re-keying
In this article, we propose a new method to protect block cipher implementations against Differential Fault Attacks (DFA). Our strategy, so-called “Tweak-in-Plaintext”, ensures that an uncontrolled value ('tweak-in') is inserted into some part of the block cipher plaintext, thus effectivel...
Main Authors: | Baksi, Anubhab, Bhasin, Shivam, Breier, Jakub, Khairallah, Mustafa, Peyrin, Thomas |
---|---|
Other Authors: | School of Computer Science and Engineering |
Format: | Conference Paper |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/88761 http://hdl.handle.net/10220/47670 |
Similar Items
-
Side channel attack on stream ciphers: a three-step approach to state/key recovery
by: Kumar, Satyam, et al.
Published: (2023) -
A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20
by: Kumar, S. V. Dilip, et al.
Published: (2018) -
DFARPA: Differential Fault Attack Resistant Physical Design Automation
by: Khairallah, Mustafa, et al.
Published: (2018) -
A new approach for side channel analysis on stream ciphers and related constructions
by: Baksi, Anubhab, et al.
Published: (2022) -
Diffusional side-channel leakage from unrolled lightweight block ciphers : a case study of power analysis on PRINCE
by: Yli-Mäyry, Ville, et al.
Published: (2021)