With a growing number of connected devices the
demand for secure communication increases steadily. Therefore,
the National Institute of Standards and Technology started
the Lightweight Cryptography competition for authenticated
encryption with associated data and hash applications. Its goal
is to identify small, power efficient and secure cryptographic
primitives. The 32 second round candidates of the Lightweight
Cryptography competition are classified into three categories
according to their architecture, i.e. block, sponge, or stream based
ciphers. Fault Analysis is an approach to perform implementation
level attacks and is composed of a broad spectrum of attack
strategies. These strategies are classified into analytical and
statistical approaches. In the following we provide an overview
of state-of-the-art fault attacks and their application. We will
then categorize Fault Analysis strategies by their application on
block, sponge, or stream based ciphers. This gives an idea of the
applicability of different kinds of Fault Analysis on the second
round candidates of the Lightweight Cryptography competition.
«
With a growing number of connected devices the
demand for secure communication increases steadily. Therefore,
the National Institute of Standards and Technology started
the Lightweight Cryptography competition for authenticated
encryption with associated data and hash applications. Its goal
is to identify small, power efficient and secure cryptographic
primitives. The 32 second round candidates of the Lightweight
Cryptography competition are classified into three categories
according to...
»