z-logo
open-access-imgOpen Access
Improved Fault Attack on LBlock: Earlier Injection with No Extra Faults
Author(s) -
Gao Si,
Chen Hua,
Fan Limin,
Wu Wenling
Publication year - 2017
Publication title -
chinese journal of electronics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.267
H-Index - 25
eISSN - 2075-5597
pISSN - 1022-4653
DOI - 10.1049/cje.2017.04.007
Subject(s) - fault (geology) , fault injection , computer science , computer security , geology , environmental science , seismology , operating system , software
As one of the most popular lightweight ciphers in recent years, LBlock has attracted great attention. Researchers have explored the security of LBlock against various attacks. We focus on fault attack–one of the most important implementation attacks. In the past two years, fault attacks under the random fault model have been successfully applied to LBlock, supposing faults were injected at the end of the 24th to the 31st round. If faults are injected at the end of the 23rd round, previous attacks only work under the semi‐random fault model. For the first time, we address this issue and propose a 23rd round fault attack under the random fault model. Compared with the previous works, our attack extends the fault injection to earlier round, with reasonable time cost and no extra faults. Experiments show that it only takes 10 faults to recover the secret key.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here