Abstract | ||
---|---|---|
In 2012, several Differential Fault Analyses on the AES cipher were analyzed from an information-theoretic perspective. This analysis exposed whether or not the leaked information was fully exploited. We apply the same approach to all existing Differential Fault Analyses on the CLEFIA cipher. We show that only some of these attacks are already optimal. We improve those analyses which did not exploit all information. With one exception, all attacks against CLEFIA-128 reach the theoretical limit after our improvement. Our improvement of an attack against CLEFIA-192 and CLEFIA-256 reduces the number of fault injections to the lowest possible number reached so far. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-319-32859-1_15 | MACIS |
Field | DocType | Citations |
Cipher,Advanced Encryption Standard,Algorithm,CLEFIA,Exploit,Fault attack,Mathematics,Differential fault analysis | Conference | 2 |
PageRank | References | Authors |
0.37 | 13 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ágnes Kiss | 1 | 5 | 2.45 |
Juliane Krämer | 2 | 74 | 7.52 |
Anke Stüber | 3 | 2 | 1.04 |