Paper 2021/1392
Differential fault attack on DEFAULT
Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, and Santanu Sarkar
Abstract
Block cipher DEFAULT has been proposed as a differential fault analysis immune cipher at Asiacrypt 2021. In this paper, we consider the initial version of DEFAULT with no permutation involved in the last round and show that one can find the key in this version with complexity $2^{16}$ by injecting 112 faults. However, our idea does not work in the modified version of the cipher.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- Block cipherDEFAULTDifferential fault attackLinear structure
- Contact author(s)
- sarkar santanu bir1 @ gmail com
- History
- 2021-10-25: revised
- 2021-10-15: received
- See all versions
- Short URL
- https://ia.cr/2021/1392
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/1392, author = {Chandan Dey and Sumit Kumar Pandey and Tapabrata Roy and Santanu Sarkar}, title = {Differential fault attack on {DEFAULT}}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/1392}, year = {2021}, url = {https://eprint.iacr.org/2021/1392} }