A Fault Attack on the LED Block Cipher
A fault-based attack on the new low-cost LED block cipher is reported. Parameterized sets of key candidates called fault tuples are generated, and filtering techniques are employed to quickly eliminate fault tuples not containing the correct key. Experiments for LED-64 show that the number of remaining key candidates is practical for performing brute-force evaluation even for a single fault injection. The extension of the attack to LED-128 is also discussed.
Keywordsdifferential fault analysis fault based attack cryptanalysis LED block cipher
Unable to display preview. Download preview PDF.
- 2.National Institute of Standards and Technology (NIST). Advanced Encryption Standard (AES). FIPS Publication 197 (2001), http://www.itl.nist.gov/fipsbups/
- 4.Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg (2006)CrossRefGoogle Scholar