Header menu link for other important links
X
A differential fault attack on plantlet
Published in IEEE Computer Society
2017
Volume: 66
   
Issue: 10
Pages: 1804 - 1808
Abstract
Lightweight stream ciphers have received serious attention in the last few years. The present design paradigm considers very small state (less than twice the key size) and use of the secret key bits during pseudo-random stream generation. One such effort, Sprout, had been proposed two years back and it was broken almost immediately. After carefully studying these attacks, a modified version named Plantlet has been designed very recently. While the designers of Plantlet do not provide any analysis on fault attacks, we note that Plantlet is even weaker than Sprout in terms of Differential Fault Attack (DFA). Our investigation, following the similar ideas as in the analysis against Sprout, shows that we require only around 4 faults to break Plantlet by DFA in a few hours time. While fault attack is indeed difficult to implement and our result does not provide any weakness of the cipher in normal mode, we believe that these initial results will be useful for further understanding of Plantlet. © 1968-2012 IEEE.
About the journal
JournalData powered by TypesetIEEE Transactions on Computers
PublisherData powered by TypesetIEEE Computer Society
ISSN00189340
Open AccessNo
Concepts (10)
  •  related image
    Cryptography
  •  related image
    CRYPTANALYSIS
  •  related image
    DESIGN PARADIGM
  •  related image
    DIFFERENTIAL FAULT ATTACK
  •  related image
    Normal modes
  •  related image
    PLANTLET
  •  related image
    Pseudo random
  •  related image
    Secret key
  •  related image
    Stream ciphers
  •  related image
    Side channel attack