fault attack
Recently Published Documents


TOTAL DOCUMENTS

201
(FIVE YEARS 58)

H-INDEX

19
(FIVE YEARS 3)

Cryptography ◽  
2021 ◽  
Vol 5 (4) ◽  
pp. 26
Author(s):  
Julian Danner ◽  
Martin Kreuzer

A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only require that the attacker can reset the internal state and inject a random byte-fault, in a random register, during a known time period. For a single fault injection, we develop a differential clocking algorithm that computes a set of linear equations in the in- and output differences of the non-linear parts of the cipher and relates them to the differential keystream. The usage of these equations is two-fold. Firstly, one can determine those differentials that can be computed from the faulty keystream, and secondly they help to pin down the actual location and timing of the fault injection. Combining these results, each fault injection gives us information on specific small parts of the internal state. By encoding the information we gain from several fault injections using the weighted Horn clauses, we construct a guessing path that can be used to quickly retrieve the internal state using a suitable heuristic. Finally, we evaluate our framework with the ISO-standardized and CRYPTREC candidate recommended cipher Enocoro-128v2. Simulations show that, on average, the secret key can be retrieved within 20 min on a standard workstation using less than five fault injections.


2021 ◽  
Vol 123 ◽  
pp. 114202
Author(s):  
Saeideh Sheikhpour ◽  
Seok-Bum Ko ◽  
Ali Mahani

2021 ◽  
Vol 30 (4) ◽  
pp. 669-675
Author(s):  
XIE Min ◽  
TIAN Feng ◽  
LI Jiaqi

Author(s):  
Dario Guidotti ◽  
Giuseppe Cicala ◽  
Tommaso Gili ◽  
Armando Tacchella

We investigate the application of methodologies for the analysis of complex networks to understand the properties of systems of systems in a cybersecurity context. We are interested to resilience and attribution: the first relates to the behavior of the system in case of faults/attacks, namely to its capacity to recover full or partial functionality after a fault/attack; the second corresponds to the capability to tell faults from attacks, namely to trace the cause of an observed malfunction back to its originating cause(s). We present experiments to witness the effectiveness of our methodology considering a discrete event simulation of a multimodal logistic network featuring 40 nodes distributed across Italy and a daily traffic roughly corresponding to the number of containers shipped through in Italian ports yearly, averaged on a daily basis.


2021 ◽  
Vol 30 (3) ◽  
pp. 534-541
Author(s):  
MA Zhen ◽  
TIAN Tian ◽  
QI Wenfeng

Sign in / Sign up

Export Citation Format

Share Document