Cryptology ePrint Archive: Report 2020/883

On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis

Jeroen Delvaux

Abstract: In an article from HOST 2018, which appears in extended form in the Cryptology ePrint Archive, Baksi, Bhasin, Breier, Khairallah, and Peyrin proposed the tweak-in-plaintext method to protect block ciphers against a differential fault analysis (DFA). We argue that this method lacks existential motivation as neither of its two envisioned use cases, i.e., the electronic codebook (ECB) and the cipher block chaining (CBC) modes of operation, is competitive. Furthermore, in a variant of the method where nonces are generated using a linear-feedback shift register (LFSR), several security problems have not been anticipated for. Finally, we analyze the security level against a brute-force DFA more rigorously than in the original work.

Category / Keywords: implementation / differential fault analysis, cipher block chaining, provable security

Date: received 13 Jul 2020

Contact author: jeroen delvaux at osr-tech com

Available format(s): PDF | BibTeX Citation

Version: 20200716:132956 (All versions of this report)

Short URL: ia.cr/2020/883


[ Cryptology ePrint archive ]