Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers. SKINNY is a new lightweight tweakable block cipher. In this paper, we present an efficient attack scheme for SKINNY-64 based on algebraic fault analysis. The optimal fault injection location is given by analyzing the diffusion of a single-bit fault at different locations during the encryption process. At the same time, by combining the algebraic fault analysis method based on S-box decomposition, the master key can be recovered in an average time of 9 s using one fault. To the best of our knowledge, our proposed attack scheme requires fewer faults, is faster to solve, and has a higher success rate than other existing attack methods.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10297097PMC
http://dx.doi.org/10.3390/e25060908DOI Listing

Publication Analysis

Top Keywords

attack scheme
12
algebraic fault
12
fault analysis
12
efficient attack
8
scheme skinny-64
8
skinny-64 based
8
based algebraic
8
lightweight block
8
block ciphers
8
fault
6

Similar Publications

A high security physical layer encryption scheme for dual-mode orthogonal frequency division multiplexing with index modulation (DM-OFDM-IM) in magnetic induction communication is proposed. The scheme utilizes DM-OFDM-IM, where subcarriers within each subblock are divided into two groups, each modulated by distinct signal constellations. DM-OFDM-IM leverages the sequential information from the modulated constellation to transmit extra information, leading to a substantial enhancement in spectral efficiency.

View Article and Find Full Text PDF

A combinatory approach of non-chain ring and henon map for image encryption application.

Sci Rep

January 2025

Department of Mathematics, College of Science, King Khalid, University, Abha, 61413, Saudi Arabia.

Algebraic structures play a vital role in securing important data. These structures are utilized to construct the non-linear components of block ciphers. Since constructing non-linear components through algebraic structures is crucial for the confusion aspects of encryption schemes, relying solely on these structures can result in limited key spaces.

View Article and Find Full Text PDF

Secure IoT data dissemination with blockchain and transfer learning techniques.

Sci Rep

January 2025

Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.

Article Synopsis
  • Streaming IoT data is crucial for building trust in sustainable IoT solutions, but current systems often face issues with reliability, security, and transparency due to their centralized structures.
  • The research introduces TraVel, a framework that uses blockchain and transfer learning to improve the security of IoT data management, utilizing decentralized IPFS for data storage and a private Ethereum blockchain for enhanced data integrity.
  • TraVel implements self-executing smart contracts for access control and uses an adversarial domain adaptation model to filter out malicious data, ensuring only validated data is stored, with successful performance shown in simulations.
View Article and Find Full Text PDF

The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers.

View Article and Find Full Text PDF

In the era of big data, advanced data processing devices and smart sensors greatly benefit us in many areas. As for each individual user, data sharing can be an essential part of the process of data collection and transmission. However, the issue of constant attacks on data privacy arouses huge concerns among the public.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!