
@Article{cmc.2020.011116,
AUTHOR = {Min Long, Man Kong, Sai Long, Xiang Zhang},
TITLE = {An Improved Differential Fault Analysis on Block Cipher  KLEIN-64},
JOURNAL = {Computers, Materials \& Continua},
VOLUME = {65},
YEAR = {2020},
NUMBER = {2},
PAGES = {1425--1436},
URL = {http://www.techscience.com/cmc/v65n2/39885},
ISSN = {1546-2226},
ABSTRACT = {KLEIN-64 is a lightweight block cipher designed for resource-constrained 
environment, and it has advantages in software performance and hardware 
implementation. Recent investigation shows that KLEIN-64 is vulnerable to differential 
fault attack (DFA). In this paper, an improved DFA is performed to KLEIN-64. It is 
found that the differential propagation path and the distribution of the S-box can be fully 
utilized to distinguish the correct and wrong keys when a half-byte fault is injected in the 
10<sup>th</sup> round. By analyzing the difference matrix before the last round of S-box, the location 
of fault injection can be limited to a small range. Thus, this improved analysis can greatly 
improve the attack efficiency. For the best case, the scale of brute-force attack is only 256. 
While for the worst case, the scale of brute-force attack is far less than 2<sup>32</sup> with another 
half byte fault injection, and the probability for this case is 1/64. Furthermore, the 
measures for KLEIN-64 in resisting the improved DFA are proposed.},
DOI = {10.32604/cmc.2020.011116}
}



