Abstract
This chapter reviews the techniques an attacker could employ to conduct a Differential Fault Analysis of the Data Encryption Standard (DES). Biham and Shamir proposed the first such attack on a block cipher based on the differential cryptanalysis of DES. This attack was later extended to permit an attack based on faults in the early or middle rounds of DES.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Europay MasterCard Visa.
- 2.
Note that a one-bit differential in the input of a DES S-box cannot produce a zero differential in the output.
- 3.
Note that the \((p_i(\cdot ))_i\) distributions are almost independent of the secret key (this fact is argued in [47]).
- 4.
This definition slightly differs from the definition in [178].
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Rivain, M. (2012). Differential Fault Analysis of DES. In: Joye, M., Tunstall, M. (eds) Fault Analysis in Cryptography. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29656-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-29656-7_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29655-0
Online ISBN: 978-3-642-29656-7
eBook Packages: Computer ScienceComputer Science (R0)