Symbols | Descriptions |
---|---|
DFA | Differential fault analysis |
FeW | Feather weight cipher |
CPA | Chosen ciphertext attack |
MK | 80-bit master secret key |
MKi | The i-th intermediate state of MK |
Ki | The leftmost 16 bits of MKi |
\(RK_{i}\) | The i-th round subkey |
\(RK_{i}^{j}\) | The j-th nibble of \(RK_{i}\) |
C | Correctly generated ciphertext |
\(C^{*}\) | The faulty ciphertext |
< < < m | Left cyclic shift m bits |
[i]2 | Binary form of i |
⊕ | Bitwise exclusive-OR operation |
|| | The concatenation of two strings |
S | The S-Box of FeW |
P | The permutation of FeW |
F | The round function |
L1, L2 | The linear functions of FeW |
\(X_{i}^{L}\) | The left part of i-th encryption state |
\(X_{i}^{R}\) | The right part of i-th encryption state |
\(X_{i,j}^{L}\) | The j-th Nibble of \(X_{i}^{L}\) |
\(X_{i,j}^{R}\) | The j-th Nibble of \(X_{i}^{R}\) |