MITM and Differential Fault Attack on ULBC
编号:17 访问权限:仅限参会人 更新:2024-10-20 14:20:32 浏览:388次 拓展类型1

报告开始:2024年10月25日 16:30(Asia/Bangkok)

报告时间:15min

所在会场:[RS2] Regular Session 2 [RS2-2] Privacy, Security for Networks

演示文件

提示:该报告下的文件权限为仅限参会人,您尚未登录,暂时无法查看。

摘要

ULBC is a SPN based block cipher, operates 64 bit state and use 128 bits key. Here we present meet-in-the-middle (MITM) attack on ULBC. MITM attack strategy proposed by Demirci and Selcuk. In this paper we partition cipher ULBC in two halves and separate key space by two independent set and observe matching between encryption of first half with decryption of second half. By this method, called MITM attack, we can reduce the key space for exhaustive search. Basic fault analysis of ULBC requires $192$ faulty ciphertext to detect full key register. Also, we provide another fault analysis method of ULBC, which requires only average $57$ faulty ciphertext to retrieve master key. Here we assume that we can induce nibble fault in after or before substitution layer to any rounds. MITM and Differential fault attack particularly exploits weakness like dependency, linearity of designing key schedule.

 

 

关键词
ULBC, MITM Attack, Fault attack
报告人
Shreyasi Ghorai
Research Scholar West Bengal State University

稿件作者
Mrinal Nandi West Bengal State University
Shreyasi Ghorai West Bengal State University
发表评论
验证码 看不清楚,更换一张
全部评论
重要日期
  • 会议日期

    10月24日

    2024

    10月27日

    2024

  • 10月14日 2024

    初稿截稿日期

  • 10月29日 2024

    注册截止日期

  • 10月31日 2024

    报告提交截止日期

主办单位
国际科学联合会
IEEE泰国分会
IEEE计算机学会泰国分会
历届会议
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询