[Resource Topic] 2020/883: On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis

Welcome to the resource topic for 2020/883

Title:
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis

Authors: Jeroen Delvaux

Abstract:

In an article from HOST 2018, which appears in extended form in the Cryptology ePrint Archive, Baksi, Bhasin, Breier, Khairallah, and Peyrin proposed the tweak-in-plaintext method to protect block ciphers against a differential fault analysis (DFA). We argue that this method lacks existential motivation as neither of its two envisioned use cases, i.e., the electronic codebook (ECB) and the cipher block chaining (CBC) modes of operation, is competitive. Furthermore, in a variant of the method where nonces are generated using a linear-feedback shift register (LFSR), several security problems have not been anticipated for. Finally, we analyze the security level against a brute-force DFA more rigorously than in the original work.

ePrint: https://eprint.iacr.org/2020/883

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .