Identyfikatory
DOI
Warianty tytułu
Języki publikacji
Abstrakty
This paper deals with the phase-shift fault analysis of stream cipher Grain v1. We assume that the attacker is able to desynchronize the linear and nonlinear registers of the cipher during the keystream generation phase by either forcing one of the registers to clock one more time, while the other register is not clocked, or by preventing one of the registers from clocking, while the other register is clocked. Using this technique, we are able to obtain the full inner state of the cipher in reasonable time (under 12 hours on a single PC) by using 150 bits of unfaulted keystream, 600 bits of faulted keystreams and by correctly guessing 28 bits of the linear register.
Rocznik
Tom
Strony
131--136
Opis fizyczny
Bibliogr. 8 poz., rys., tab., wykr.
Twórcy
autor
- Faculty of Electrical Engineering and Information Technology, Slovak University of Technology in Bratislava, Bratislava, Slovakia
autor
- Slovak University of Technology in Bratislava, Bratislava, Slovakia
Bibliografia
- [1] BANIK, S. - MAITRA, S. - SARKAR, S. A Differential Fault Attack on the Grain Family of Stream Ciphers. In CHES. 2012. p. 122-139.
- [2] BANIK, S. - MAITRA, S. - SARKAR, S. A Differential Fault Attack on the Grain Family under Reasonable Assumptions. In Indocrypt. 2012. p. 191-208.
- [3] BANIK, S. - MAITRA, S. - SARKAR, S. Differential Fault Attack against Grain family with very few faults and minimal assumptions. In IEEE Transactions on Computers, 2015, 64.6: 1647-1657.
- [4] GOMUŁKIEWICZ, M., et al. Synchronization Fault Cryptanalysis for Breaking A5/1. In Experimental and Efficient Algorithms. Springer Berlin Heidelberg, 2005, p. 415-427.
- [5] HELL, M. - JOHANSSON, T. - MEIER, W. Grain: a stream cipher for constrained environments. In International Journal of Wireless and Mobile Computing, 2007, 2.1: 86-93.
- [6] HOCH, J. - SHAMIR, A. Fault analysis of stream ciphers. In: International Workshop on Cryptographic Hardware and Embedded Systems. Springer Berlin Heidelberg, 2004. p. 240-253.
- [7] HROMADA, V. - VARGA, J. Phase-shift Fault Analysis of Trivium. In Studia Scientiarum Mathematicarum Hungarica, 2015, 52.2: 205-220.
- [8] LOE, C. W. - KHOO, K. Side Channel Attacks on Irregularly Decimated Generators. In Information Security and Cryptology - ICISC 2007, Springer Berlin Heidelberg, 2007, p. 116-130.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-23e7143e-4271-420d-a06a-8876d76c64b8