Article (Scientific journals)
Differential Fault Attack on Rasta and FiLIP-DSM
Radheshwar, R.; Kansal, Meenakshi; MEAUX, Pierrick et al.
2023In IEEE Transactions on Computers, 72 (8), p. 2418--2425
Peer Reviewed verified by ORBi
 

Files


Full Text
2023-322.pdf
Author preprint (477.46 kB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Abstract :
[en] In this paper we propose Differential Fault Attack (DFA) on two Fully Homomorphic Encryption (FHE) friendly stream ciphers Rasta and . Design criteria of Rasta rely on affine layers and nonlinear layers, whereas relies on permutations and a nonlinear fil- ter function. Here we show that the secret key of these two ciphers can be recovered by injecting only 1 bit fault in the initial state. Our DFA on full round (# rounds = 6) Rasta with 219 block size requires only one block (i.e., 219 bits) of normal and faulty keystream bits. In the case of our DFA on FiLIP-430 (one instance of ), we need 30000 normal and faulty keystream bits.
Disciplines :
Computer science
Author, co-author :
Radheshwar, R.
Kansal, Meenakshi
MEAUX, Pierrick  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > PI Coron
Roy, Dibyendu
External co-authors :
yes
Language :
English
Title :
Differential Fault Attack on Rasta and FiLIP-DSM
Publication date :
2023
Journal title :
IEEE Transactions on Computers
ISSN :
0018-9340
eISSN :
1557-9956
Publisher :
Institute of Electrical and Electronics Engineers, United States - New York
Volume :
72
Issue :
8
Pages :
2418--2425
Peer reviewed :
Peer Reviewed verified by ORBi
Focus Area :
Security, Reliability and Trust
Available on ORBilu :
since 25 July 2023

Statistics


Number of views
73 (5 by Unilu)
Number of downloads
54 (0 by Unilu)

Scopus citations®
 
6
Scopus citations®
without self-citations
4
OpenAlex citations
 
3

Bibliography


Similar publications



Contact ORBilu