Paper 2021/1392

Differential fault attack on DEFAULT

Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, and Santanu Sarkar

Abstract

Block cipher DEFAULT has been proposed as a differential fault analysis immune cipher at Asiacrypt 2021. In this paper, we consider the initial version of DEFAULT with no permutation involved in the last round and show that one can find the key in this version with complexity $2^{16}$ by injecting 112 faults. However, our idea does not work in the modified version of the cipher.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Block cipherDEFAULTDifferential fault attackLinear structure
Contact author(s)
sarkar santanu bir1 @ gmail com
History
2021-10-25: revised
2021-10-15: received
See all versions
Short URL
https://ia.cr/2021/1392
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1392,
      author = {Chandan Dey and Sumit Kumar Pandey and Tapabrata Roy and Santanu Sarkar},
      title = {Differential fault attack on DEFAULT},
      howpublished = {Cryptology ePrint Archive, Paper 2021/1392},
      year = {2021},
      note = {\url{https://eprint.iacr.org/2021/1392}},
      url = {https://eprint.iacr.org/2021/1392}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.