Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers. SKINNY is a new lightweight tweakable block cipher. In this paper, we present an efficient attack scheme for SKINNY-64 based on algebraic fault analysis. The optimal fault injection location is given by analyzing the diffusion of a single-bit fault at different locations during the encryption process. At the same time, by combining the algebraic fault analysis method based on S-box decomposition, the master key can be recovered in an average time of 9 s using one fault. To the best of our knowledge, our proposed attack scheme requires fewer faults, is faster to solve, and has a higher success rate than other existing attack methods.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10297097 | PMC |
http://dx.doi.org/10.3390/e25060908 | DOI Listing |
A high security physical layer encryption scheme for dual-mode orthogonal frequency division multiplexing with index modulation (DM-OFDM-IM) in magnetic induction communication is proposed. The scheme utilizes DM-OFDM-IM, where subcarriers within each subblock are divided into two groups, each modulated by distinct signal constellations. DM-OFDM-IM leverages the sequential information from the modulated constellation to transmit extra information, leading to a substantial enhancement in spectral efficiency.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Mathematics, College of Science, King Khalid, University, Abha, 61413, Saudi Arabia.
Algebraic structures play a vital role in securing important data. These structures are utilized to construct the non-linear components of block ciphers. Since constructing non-linear components through algebraic structures is crucial for the confusion aspects of encryption schemes, relying solely on these structures can result in limited key spaces.
View Article and Find Full Text PDFSci Rep
January 2025
Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.
Sensors (Basel)
January 2025
School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea.
The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers.
View Article and Find Full Text PDFSensors (Basel)
December 2024
Electrical Engineering and Computer Science (EECS), KTH Royal Institute of Technology, 10044 Stockholm, Sweden.
In the era of big data, advanced data processing devices and smart sensors greatly benefit us in many areas. As for each individual user, data sharing can be an essential part of the process of data collection and transmission. However, the issue of constant attacks on data privacy arouses huge concerns among the public.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!