A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition

F Zhang, Z Liang, B Yang, X Zhao, S Guo… - Frontiers of Information …, 2018 - Springer
Abstract The Competition for Authenticated Encryption: Security, Applicability, and
Robustness (CAESAR) supported by the National Institute of Standards and Technology …

Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

Random differential fault attacks on the lightweight authenticated encryption stream cipher grain-128AEAD

I Salam, TH Ooi, L Xue, WC Yau, J Pieprzyk… - IEEE …, 2021 - ieeexplore.ieee.org
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the
finalists in the National Institute of Standards and Technology (NIST) Lightweight …

Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128

I Salam, WC Yau, RCW Phan, J Pieprzyk - Journal of Cryptographic …, 2023 - Springer
We investigate a technique that needs to apply multiple random faults to the same target
location and compare the impact of these faults on the fault-free and faulty output to recover …

Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS

R Anand, T Isobe, AK Kundu, M Rahman… - Journal of Cryptographic …, 2024 - Springer
Abstract The beyond 5G (B5G)/6G eras promise to revolutionize wireless communication
with unprecedented speeds. However, ensuring security across hardware and software is a …

Cryptanalysis of full round FUTURE with multiple biclique structures

HS Roy, P Dey, SK Mondal, A Adhikari - Peer-to-Peer Networking and …, 2024 - Springer
FUTURE, recently proposed in AFRICACRYPT 2022, is a lightweight Substitution
Permutation Network (SPN) based block cipher with 10 rounds. In this paper, we propose …

Random fault attacks on a class of stream ciphers

H Bartlett, E Dawson, H Qahur Al Mahri… - Security and …, 2019 - Wiley Online Library
In this paper, we show that stream ciphers with a particular form of ciphertext output function
are vulnerable to differential fault attacks using random faults. The CAESAR competition …

Improved Fault Analysis on Subterranean 2.0

SK Mondal, P Dey, HS Roy, A Adhikari… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Subterranean 2.0, a NIST second round lightweight cryptographic primitive, was introduced
by Daemen et al. in 2020. It has three modes of operation: Subterranean-SAE, Subterranean …