Skip to main content

Table 5 Attack 1 - equations to decrease the number of candidates of the secret key

From: Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks

Related secret key

Equation

Filtering probability

(k58, k59, k60)

{( S 9 − 1 [ K 32 , 7 ])≫1}=( K 32 , 0 &0x7)

2−3

(k37, k38)

(K32,2&0x 3) = (K30,7 ≫ 2)

2−2

(k35, k36)

(K32,1≫2) = (K30,7&0x 3)

2−2

(k33, k34)

(K32,1&0x 3) = (K30,6 ≫ 2)

2−2

(k31, k32)

{(K32,0 ≫ 2) ⊕ 0x 1} = (K30,6&0x 3)

2−2

(k29, k30)

{(K32,0&0x 3) ⊕ 0x 3} = (K30,5 ≫ 2)

2−2

(k7, k8, k9)

{( S 9 − 1 [ K 31 , 7 ])≫1}=( K 30 , 0 &0x7)

2−3

k 60

[{( S 9 − 1 [ K 32 , 7 ])≫3}⊕0x1]=( K 29 , 6 &0x1)

2−1

(k57, k58, k59)

[{( S 9 − 1 [ K 32 , 7 ])&0x7}⊕0x7]=( K 29 , 5 ≫1)

2−3

k 56

{( S 8 − 1 [ K 32 , 6 ])≫3}=( K 29 , 5 &0x1)

2−1

(k53, k54, k55)

{( S 8 − 1 [ K 32 , 6 ])&0x7}=( K 29 , 4 ≫3)

2−3

k 52

(K32,5 ≫ 3) = (K29,4&0x 1)

2−1

(k49, k50, k51)

(K32,5&0x 7) = (K29,3 ≫ 1)

2−3

k 48

(K32,4 ≫ 3) = (K29,3&0x 1)

2−1

(k45, k46, k47)

(K32,4&0x 7) = (K29,2 ≫ 1)

2−3

k 44

(K32,3 ≫ 3) = (K29,2&0x 1)

2−1

(k41, k42, k43)

(K32,3&0x 7) = (K29,1 ≫ 1)

2−3

k 40

(K32,2 ≫ 3) = (K29,1&0x 1)

2−1

k 39

{(K32,2 ≫ 2)&0x 1} = (K29,0 ≫ 3)

2−1

(k36, k37, k38)

{( S 9 − 1 [ K 30 , 7 ])≫1}=( K 29 , 0 &0x7)

2−3