Improved differential fault analysis on camellia-128

0Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we propose improved Differential Fault Analysis (DFA) on the block cipher Camellia with a 128-bit key. Existing DFAs on Camellia-128 require several faults induced at multiple rounds, at least two of which must be induced at or after the 16-th round. On the other hand, by utilizing longer fault propagation paths than the existing DFAs, the proposed attacks require random byte faults to targeted byte positions induced only at the 14-th round. The simulation results confirm the feasibility of the proposed attacks. Our attacks indicate that the last 5 rounds of Camellia-128, two more rounds compared with the existing DFAs, must be protected against DFAs.

Cite

CITATION STYLE

APA

Akishita, T., & Kunihiro, N. (2016). Improved differential fault analysis on camellia-128. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9689, pp. 130–143). Springer Verlag. https://doi.org/10.1007/978-3-319-43283-0_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free