[Virtual Presentation]MITM and Differential Fault Attack on ULBC

MITM and Differential Fault Attack on ULBC
ID:17 Submission ID:125 View Protection:ATTENDEE Updated Time:2024-07-30 15:59:08 Hits:12 Virtual Presentation

Start Time:2024-10-25 16:30 (Asia/Bangkok)

Duration:15min

Session:[RS2] Regular Session 2 » [RS2-2] Privacy, Security for Networks

No files

Abstract

In this paper we partition cipher ULBC in two halves and separate key space by two independent set and observe matching between encryption of first half with decryption of second half. By this method, called MITM attack, we can reduce the key space for exhaustive search. Basic fault analysis of ULBC requires $192$ faulty ciphertext to detect full key register. Also, we provide another fault analysis method of ULBC, which requires only average $57$ faulty ciphertext to retrieve master key. Here we assume that we can induce nibble fault in after or before substitution layer to any rounds.

 

Keywords
ULBC, MITM Attack, Fault attack
Speaker
Shreyasi Ghorai
Research Scholar West Bengal State University

Submission Author
Mrinal Nandi West Bengal State University
Shreyasi Ghorai West Bengal State University
Comment submit
Verification code Change another
All comments

CONTACT US

Conference Email: asiancomnet@usssociety.org

Whatsapp Group:  https://chat.whatsapp.com/HWRmX5hM1hFJKsbgMvpNTz

Meta(Facebook) Public Page: Usssociety.org

X(Twitter): @USSSOCIETY_ORG

 

 

Registration Submit Paper