Citation: | MA Xiangliang, ZHANG Lizhen, WU Liji, et al., “Differential Fault Analysis on 3DES Middle Rounds Based on Error Propagation,” Chinese Journal of Electronics, vol. 31, no. 1, pp. 68-78, 2022, doi: 10.1049/cje.2021.00.117 |
[1] |
Boneh D, DeMillo R A, and Lipton R J, “On the importance of checking cryptographic protocols for faults,” International Conference on the Theory and Applications of Cryptographic Techniques, Konstanz, pp.37–51, 1997.
|
[2] |
E. Biham and A. Shamir, “Differential fault analysis of secret key cryptosystems,” in Proc. of Annual International Cryptology Conference, Santa Barbara, CA, pp.513–525, 1997.
|
[3] |
G. Piret and J. J. Quisquater, “A differential fault attack technique against SPN structures, with application to the AES and Khazad,” International Workshop on Cryptographic Hardware and Embedded Systems, Cologne, pp.77–88, 2003.
|
[4] |
H. Chen, W. Wu, and Feng D, “Differential fault analysis on CLEFIA,” International Conference on Information and Communications Security, Zhengzhou, pp.284–295, 2007.
|
[5] |
Zhou Y, Wu W, Xu N, et al., “Differential fault attack on Camellia,” Chinese Journal of Electronics, vol.18, no.1, pp.13–19, 2009.
|
[6] |
Feng J, Chen H, Gao S, et al., “Fault analysis on a new block cipher DBlock with at most two fault injections,” Chinese Journal of Electronics, vol.27, no.6, pp.1277–1282, 2018. doi: 10.1049/cje.2018.09.003
|
[7] |
W. L. Wu, L. Zhang, and X. L. Yu, “The DBlock family of block ciphers,” Science China Information Sciences, vol.58, no.3, pp.1–14, 2015.
|
[8] |
I. Biehl, B. Meyer, and V. Müller, “Differential fault attacks on elliptic curve cryptosystems,” Annual International Cryptology Conference, Santa Barbara, CA, pp.131–146, 2000.
|
[9] |
E. Biham, L. Granboulan, and P. Q. Nguyễn, “Impossible fault analysis of RC4 and differential fault analysis of RC4,” International Workshop on Fast Software Encryption, Paris, pp.359–367, 2005.
|
[10] |
M. Hojsík and B. Rudolf, “Differential fault analysis of Trivium,” International Workshop on Fast Software Encryption, Lausanne, pp.158–172, 2008.
|
[11] |
M. Rivain, “Differential fault analysis on DES middle rounds,” Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, Lausanne, pp.457–469, 2009.
|
[12] |
Dobraunig C, Eichlseder M, Korak T, et al., “SIFA: Exploiting ineffective fault inductions on symmetric cryptography,” IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2018, no.3, pp.547–572, 2018.
|
[13] |
FIPS PUB 46-3:1999, Data Encryption Standard (DES), National Institute of Standards and Technology, 1999.
|