论文部分内容阅读
As one of the most popular lightweight ciphers in recent years, LBlock has attracted great attention.Researchers have explored the security of LBlock against various attacks. We focus on fault attack—one of the most important implementation attacks. In the past two years,fault attacks under the random fault model have been successfully applied to LBlock, supposing faults were injected at the end of the 24 th to the 31 st round. If faults are injected at the end of the 23 rd round, previous attacks only work under the semi-random fault model. For the first time, we address this issue and propose a 23 rd round fault attack under the random fault model. Compared with the previous works, our attack extends the fault injection to earlier round, with reasonable time cost and no extra faults. Experiments show that it only takes 10 faults to recover the secret key.
As one of the most popular lightweight ciphers in recent years, LBlock has attracted great attention. Researchers have explored the security of LBlock against various attacks. We focus on fault attack-one of the most important implementation attacks. In the past two years, fault attacks under the random fault model have been successfully applied to LBlock, supposing faults were injected at the end of the 24 th to 31 st round. If faults are injected at the end of the 23 rd round, previous attacks only work under the semi -random fault model. For the first time, we address this issue and propose a 23 rd round fault attack under the random fault model. Compared with the previous works, our attack extends the fault injection to earlier round, with reasonable time cost and no extra faults. Experiments show that it only takes 10 faults to recover the secret key.