Differential Fault Attack on the Stream Cipher LIZARD

被引:0
作者
MA Zhen [1 ]
TIAN Tian [1 ]
QI Wenfeng [1 ]
机构
[1] National Digital Switching System Engineering Technological Research Center
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
In this paper, we try to give a security evaluation of LIZARD stream cipher in regard to fault attacks, which, to the best of our knowledge, is the first fault analysis on LIZARD. We design a differential engine of LIZARD to track the differential trail of the keystreams. It is shown that the distributions of the keystream differences are heavily biased. Utilizing this characteristic, we propose an improved method to identify the fault location for LIZARD whose success probability approaches 1. Then we use the fault-free keystream and faulty keystreams to generate system of equations in internal state variables and solve it by SAT solver. The result shows that with 100 keystream bits, only 6 different faults are needed to recover the internal state. Finally,the comparison between LIZARD and Grain v1 shows that LIZARD is more resistable than Grain v1 in regard to fault attacks.
引用
收藏
页码:534 / 541
页数:8
相关论文
共 50 条
  • [41] Algebraic cube attack on Sfinks stream cipher
    Li, Shunbo
    Hu, Yupu
    Zhao, Yongbin
    Wang, Yan
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (10): : 4295 - 4302
  • [42] Differential analysis of stream cipher Phelix
    [J]. Guan, J. (guanjie007@163.com), 1600, Shanghai Jiaotong University (47):
  • [43] A fault attack against the FOX cipher family
    Breveglieri, L.
    Koren, I.
    Maistri, P.
    [J]. FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2006, 4236 : 98 - 105
  • [44] Improved Related-Cipher Attack on Salsa20 Stream Cipher
    Ding, Lin
    [J]. IEEE ACCESS, 2019, 7 : 30197 - 30202
  • [45] A complete divide and conquer attack on the alphal stream cipher
    Chen, K
    Simpson, L
    Henricksen, M
    Millan, W
    Dawson, E
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 418 - 431
  • [46] Improved Key Recovery Attack on the BEAN Stream Cipher
    Wang, Hui
    Hell, Martin
    Johansson, Thomas
    Agren, Martin
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1437 - 1444
  • [47] Probabilistic algebraic attack on plantlet lightweight stream cipher
    Dheeraj Kumar Sharma
    Rajoo Pandey
    Tapas Chatterjee
    [J]. Sādhanā, 48
  • [48] Distinguishing attack on SN3 stream cipher
    Orumiehchi, Mohammad Ali
    Mohebbipoor, S. Fahimeh
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1392 - 1395
  • [49] Distinguishing attack on stream cipher HC-256'
    [J]. Li, S.-B. (shunboli@163.com), 2012, Science Press (34): : 807 - 811
  • [50] A new distinguish attack against ABC stream cipher
    Falahati, Abolfazl
    Bagheri, Nasoor
    Naderi, Majid
    Mohajeri, Javad
    [J]. 9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1768 - 1770