{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:50:20Z","timestamp":1757544620376},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,6,3]],"date-time":"2013-06-03T00:00:00Z","timestamp":1370217600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>LBlock is a 64-bit lightweight block cipher which can be implemented in both constrained hardware environments, such as wireless sensor network, and software platforms. In this paper, we study the security of LBlock against a differential fault analysis. Based on a random nibble fault model, we propose two versions of the attack on LBlock. In the first attack, we inject random nibble faults to the input register of round 29. As a result, it can recover the secret key of LBlock using an exhaustive search of 2<jats:sup>25<\/jats:sup> and five random nibble fault injections on average. This attack can be simulated on a general PC within a few seconds. In the case of second attack, random nibble faults are induced to the input register of round 30. This attack can recover the secret key of LBlock using an exhaustive search of 2<jats:sup>30<\/jats:sup> and seven random nibble fault injection on average. This attack can be simulated on a general PC within 1 h. These results are superior to known differential fault analytic result on LBlock.<\/jats:p>","DOI":"10.1186\/1687-1499-2013-151","type":"journal-article","created":{"date-parts":[[2013,6,3]],"date-time":"2013-06-03T10:44:17Z","timestamp":1370256257000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks"],"prefix":"10.1186","volume":"2013","author":[{"given":"Kitae","family":"Jeong","sequence":"first","affiliation":[]},{"given":"Changhoon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jong In","family":"Lim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,3]]},"reference":[{"key":"766_CR1","first-page":"513","volume-title":"Proceedings of Advances in Cryptology - CRYPTO 1997","author":"E Biham","year":"1997","unstructured":"Biham E, Shamir A: Differential fault analysis of secret key cryptosystems. In Proceedings of Advances in Cryptology - CRYPTO 1997. Edited by: Kaliski B. Berlin: Springer; 1997:513-525."},{"issue":"3(A","key":"766_CR2","first-page":"1915","volume":"16","author":"K Jeong","year":"2013","unstructured":"Jeong K, Sung J, Hong S, Lee C: A new approach of differential fault analysis on block ciphers with s-box. Inf. - An Int. Interdiscip. J 2013, 16(3(A):1915-1928.","journal-title":"Inf. - An Int. Interdiscip. J"},{"key":"766_CR3","volume-title":"Peer-to-Peer Netw. Appl","author":"K Jeong","year":"2013","unstructured":"Jeong K: Security analysis of block cipher piccolo suitable for wireless sensor networks. Peer-to-Peer Netw. Appl 2013. 10.1007\/s12,083--012--0196--9"},{"key":"766_CR4","first-page":"747","volume-title":"Proceedings of The 6th International Symposium on Digital Forensics and Information Security(DFIS-12)","author":"K Jeong","year":"2012","unstructured":"Jeong K, Lee C: Differential fault analysis on block cipher led-64. In Proceedings of The 6th International Symposium on Digital Forensics and Information Security(DFIS-12). Edited by: Park J, Leung V, Wang C, Shon T. Netherlands: Springer; 2012:747-755."},{"issue":"1\u20132","key":"766_CR5","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.mcm.2011.01.008","volume":"55","author":"K Jeong","year":"2012","unstructured":"Jeong K, Lee Y, Sung J, Hong S: Differential fault analysis on block cipher seed. Math. Comput. Model 2012, 55(1\u20132):26-34.","journal-title":"Math. Comput. Model"},{"issue":"19","key":"766_CR6","doi-asserted-by":"publisher","first-page":"3727","DOI":"10.1016\/j.ins.2008.05.031","volume":"178","author":"W Li","year":"2008","unstructured":"Li W, Gu D, Li J: Differential fault analysis on the aria algorithm. Inf. Sci 2008, 178(19):3727-3737. 10.1016\/j.ins.2008.05.031","journal-title":"Inf. Sci"},{"issue":"2","key":"766_CR7","first-page":"241","volume":"8","author":"R Malhotra","year":"2012","unstructured":"Malhotra R, Jain A: Fault prediction using statistical and machine learning methods for improving software quality. JIPS 2012, 8(2):241-262.","journal-title":"JIPS"},{"key":"766_CR8","first-page":"327","volume-title":"Proceedings of ACNS 2011","author":"W Wu","year":"2011","unstructured":"Wu W, Zhang L: Lblock: A lightweight block cipher. In Proceedings of ACNS 2011. Edited by: Lopez J, Tsudik G. Berlin: Springer; 2011:327-344."},{"key":"766_CR9","first-page":"179","volume-title":"Proceedings of WISTP 2012","author":"F Karakoc","year":"2012","unstructured":"Karakoc F, Demirci J, Harmanci A: Impossible differential cryptanalysis on reduced-round Lblock. In Proceedings of WISTP 2012. Edited by: Posegga J, Askoxylakis I, Pohls H. Berlin: Springer; 2012:179-188."},{"key":"766_CR10","first-page":"97","volume-title":"Proceedings of ISPEC 2012","author":"Y Liu","year":"2012","unstructured":"Liu Y, Gu D, Liu Z, Li W: Impossible differential attacks on reduced-round Lblock. In Proceedings of ISPEC 2012. Edited by: Ryan M, Smyth B, Wang G. Berlin: Springer; 2012:97-108."},{"key":"766_CR11","first-page":"135","volume-title":"Proceedings of COSADE 2012","author":"L Zhao","year":"2012","unstructured":"Zhao L, Nishide T, Sakurai K: Differential fault analysis of full Lblock. In Proceedings of COSADE 2012. Edited by: Huss S, Schindler W. Berlin: Springer; 2012:135-150."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-151.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-151\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-151.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T00:55:13Z","timestamp":1630544113000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,3]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["766"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-151","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,3]]},"assertion":[{"value":"3 April 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2013","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2013","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"151"}}