You are here : Home > DFA on LS-Designs with a Practical Implementation on SCREAM

Publications

DFA on LS-Designs with a Practical Implementation on SCREAM

Published on 29 March 2018
DFA on LS-Designs with a Practical Implementation on SCREAM
Description
 
Date 
Authors
Lac B., Canteaut A., Fournier J., Sirdey R.
Year2017-0011
Source-TitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Affiliations
CEA-Tech, Gardanne, France, Inria, Paris, France, CEA-Leti, Grenoble, France, CEA-List, Saclay, France, ENSM-SE, Saint-Étienne, France
Abstract
LS-Designs are a family of SPN-based block ciphers whose linear layer is based on the so-called interleaved construction. They will be dedicated to low-end devices with high performance and low-resource constraints, objects which need to be resistant to physical attacks. In this paper we describe a complete Differential Fault Analysis against LS-Designs and also on other families of SPN-based block ciphers. First we explain how fault attacks can be used against their implementations depending on fault models. Then, we validate the DFA in a practical example on a hardware implementation of SCREAM running on an FPGA. The faults have been injected using electromagnetic pulses during the execution of SCREAM and the faulty ciphertexts have been used to recover the key’s bits. Finally, we discuss some countermeasures that could be used to thwart such attacks. © 2017, Springer International Publishing AG.
Author-Keywords
DFA, EM fault attacks, Lightweight cryptography, LS-Designs, SCREAM, SPN-based block ciphers
Index-Keywords
Cryptography, Electromagnetic pulse, Hardware, Lyapunov methods, Security of data, Block ciphers, End-devices, Fault model, Hardware implementations, Light-weight cryptography, Physical attacks, Resource Constraint, SCREAM, Side channel attack
ISSN3029743
LinkLink

Retour à la liste