Theoretical differential fault attacks on FLIP and FiLIP

被引:0
作者
Meaux, Pierrick [1 ]
Roy, Dibyendu [2 ]
机构
[1] Luxembourg Univ, Esch Sur Alzette, Luxembourg
[2] Indian Inst Informat Technol Vadodara, Gandhinagar, India
来源
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 2024年 / 16卷 / 04期
基金
欧洲研究理事会;
关键词
Fault attacks; FLIP; FiLIP; Boolean functions; ALGEBRAIC ATTACKS; STREAM CIPHERS;
D O I
10.1007/s12095-024-00698-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article, we examine Differential Fault Attacks (DFA) targeting two stream ciphers, FLIP and FiLIP. We explore the fault model where an adversary flips a single bit of the key at an unknown position. Our analysis involves establishing complexity bounds for these attacks, contingent upon the cryptographic parameters of the Boolean functions employed as filters and the key size. Initially, we demonstrate how the concept of sensitivity enables the detection of the fault position using only a few keystream bits. This represents an enhancement over previous DFA methodologies applied to these ciphers. Subsequently, we leverage the properties of the filter's derivatives to execute attacks. This approach is universally applicable to any filter, and we delineate specific attack strategies for the two function families previously implemented in these ciphers.
引用
收藏
页码:721 / 744
页数:24
相关论文
共 36 条
  • [1] BABBAGE M, 2008, LECT NOTES COMPUT SC, P191
  • [2] Banik S, 2013, LECT NOTES COMPUT SC, V8086, P215, DOI 10.1007/978-3-642-40349-1_13
  • [3] Bellare M., 2003, TOPICS CRYPTOLOGY CT
  • [4] Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
  • [5] Boneh D., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P37
  • [6] Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
    Canteaut, Anne
    Carpov, Sergiu
    Fontaine, Caroline
    Lepoint, Tancrede
    Naya-Plasencia, Maria
    Paillier, Pascal
    Sirdey, Renaud
    [J]. FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 313 - 333
  • [7] Carlet C., 2021, Boolean Functions for Cryptography and Coding Theory
  • [8] Carlet C., 2017, IACR T SYMMETRIC CRY, V3, P2017
  • [9] A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions
    Carlet, Claude
    Meaux, Pierrick
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (05) : 3404 - 3425
  • [10] SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering<bold> </bold>
    Cong, Kelong
    Das, Debajyoti
    Park, Jeongeun
    Pereira, Hilder V. L.
    [J]. PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 563 - 577