Published in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2025.
| Anup Kumar Kundu | |
| Shibam Ghosh | |
| Aikata Aikata | |
| Dhiman Saha |
In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically verifiable attacks on bit-oriented ciphers like GIFT and BAKSHEESH. The idea stems from the fact that truncated differential paths induced due to fault injection in certain intermediate rounds of the ciphers lead to active SBox-es in subsequent rounds whose inputs admit specific truncated differences. This leads to a (multi-round) impossible differential distinguisher, which can be incrementally leveraged for key-guess elimination via partial decryption.
| Read the full paper | Artifact |