This paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (ARX)-based stream ciphers. ChaCha has recently been deployed for speeding up and strengthening HTTPS connections for Google Chrome on Android devices. In this paper, we propose differential fault analysis attacks on ChaCha without resorting to nonce misuse. We use the instruction skip and instruction replacement fault models, which are popularly mounted on microcontroller-based cryptographic implementations. We corroborate the attack propositions via practical fault injection experiments using a laser-based setup targeting an Atmel AVR 8-bit microcontroller-based implementation of ChaCha. Each of the proposed attacks can be repeated with 100%...
ChaCha is a family of stream ciphers that are very efficient on constrainted platforms. In this pape...
Chacha20 is a widely used stream cipher known for using permutation functions to enhance resistance ...
Redundancy based countermeasures against fault attacks are a popular choice in security-critical com...
This paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (...
© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis st...
Part 9: CryptographyInternational audienceLEA is a symmetric block cipher proposed in 2014. It uses ...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
We present several improvements to the framework of differential-linear attacks with a special focus...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
We show that a particular class of stream ciphers - namely those in which the output function contai...
This paper describes two different fault injection attacks on the authenticated encryption stream ci...
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only...
We present the first practically realizable sidechannel assisted fault attack on PRESENT, that can r...
ChaCha is a family of stream ciphers that are very efficient on constrainted platforms. In this pape...
Chacha20 is a widely used stream cipher known for using permutation functions to enhance resistance ...
Redundancy based countermeasures against fault attacks are a popular choice in security-critical com...
This paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (...
© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis st...
Part 9: CryptographyInternational audienceLEA is a symmetric block cipher proposed in 2014. It uses ...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
We present several improvements to the framework of differential-linear attacks with a special focus...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
We show that a particular class of stream ciphers - namely those in which the output function contai...
This paper describes two different fault injection attacks on the authenticated encryption stream ci...
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only...
We present the first practically realizable sidechannel assisted fault attack on PRESENT, that can r...
ChaCha is a family of stream ciphers that are very efficient on constrainted platforms. In this pape...
Chacha20 is a widely used stream cipher known for using permutation functions to enhance resistance ...
Redundancy based countermeasures against fault attacks are a popular choice in security-critical com...