Skip to main content
Top

2015 | OriginalPaper | Chapter

Differential Fault Attack on LEA

Authors : Dirmanto Jap, Jakub Breier

Published in: Information and Communication Technology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms.
In this paper we propose a Differential Fault Analysis attack on LEA. By injecting random bit faults in the last round and in the penultimate round, we were able to recover the secret key by using 258 faulty encryptions in average. If the position of faults is known, then only 62 faulty encryptions are needed in order to recover the key which surpasses the results achieved so far.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997) CrossRef Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997) CrossRef
2.
go back to reference Bogdanov, A., Varici, K., Mouha, N., Velichkov, V., Tischhauser, E., Wang, M., Toz, D., Wang, Q., Rijmen, V.: Security evaluation of the block cipher LEA. Technical report, July 2011 Bogdanov, A., Varici, K., Mouha, N., Velichkov, V., Tischhauser, E., Wang, M., Toz, D., Wang, Q., Rijmen, V.: Security evaluation of the block cipher LEA. Technical report, July 2011
3.
go back to reference Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997) CrossRef Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997) CrossRef
4.
go back to reference Clavier, C.: Attacking block ciphers. In: Joye, M., Tunstall, M. (eds.) Fault Analysis in Cryptography. Information Security and Cryptography, pp. 19–35. Springer, Heidelberg (2012)CrossRef Clavier, C.: Attacking block ciphers. In: Joye, M., Tunstall, M. (eds.) Fault Analysis in Cryptography. Information Security and Cryptography, pp. 19–35. Springer, Heidelberg (2012)CrossRef
5.
go back to reference Giang, N.K., Im, J., Kim, D., Jung, M., Wolfgang, K.: Integrating the EPCIS and building automation system into the internet of things: a lightweight and interoperable approach. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 6(1), 56–73 (2015) Giang, N.K., Im, J., Kim, D., Jung, M., Wolfgang, K.: Integrating the EPCIS and building automation system into the internet of things: a lightweight and interoperable approach. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 6(1), 56–73 (2015)
6.
go back to reference Hong, D., Lee, J.-K., Kim, D.-C., Kwon, D., Ryu, K.H., Lee, D.-G.: LEA: a 128-bit block cipher for fast encryption on common processors. In: Kim, Y., Lee, H., Perrig, A. (eds.) WISA 2013. LNCS, vol. 8267, pp. 3–27. Springer, Heidelberg (2014) CrossRef Hong, D., Lee, J.-K., Kim, D.-C., Kwon, D., Ryu, K.H., Lee, D.-G.: LEA: a 128-bit block cipher for fast encryption on common processors. In: Kim, Y., Lee, H., Perrig, A. (eds.) WISA 2013. LNCS, vol. 8267, pp. 3–27. Springer, Heidelberg (2014) CrossRef
7.
go back to reference Myungseo, P., Jongsung, K.: Differential fault analysis of the block cipher LEA. J. Korea Inst. Info. Secur. Cryptology 24(6), 1117–1127 (2014)CrossRef Myungseo, P., Jongsung, K.: Differential fault analysis of the block cipher LEA. J. Korea Inst. Info. Secur. Cryptology 24(6), 1117–1127 (2014)CrossRef
8.
go back to reference Robles, T., Alcarria, R., Martín, D., Navarro, M., Calero, R., Iglesias, S., López, M.: An IoT based reference architecture for smart water management processes. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 6(1), 4–23 (2015) Robles, T., Alcarria, R., Martín, D., Navarro, M., Calero, R., Iglesias, S., López, M.: An IoT based reference architecture for smart water management processes. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 6(1), 4–23 (2015)
9.
go back to reference Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Differential fault analysis on the families of simon and speck ciphers. In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 40–48, September 2014 Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Differential fault analysis on the families of simon and speck ciphers. In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 40–48, September 2014
Metadata
Title
Differential Fault Attack on LEA
Authors
Dirmanto Jap
Jakub Breier
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-24315-3_27

Premium Partner