Differential Fault Analysis on Stream Cipher MUGI

被引:1
|
作者
Takahashi, Junko [1 ,2 ]
Fukunaga, Toshinori [3 ]
Sakiyama, Kazuo [2 ]
机构
[1] NTT Corp, NTT Informat Sharing Platform Labs, Musashino, Tokyo 1808585, Japan
[2] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
[3] NTT Corp, Technol Planning Dept, Tokyo 1008116, Japan
关键词
fault analysis; differential fault analysis (DFA); stream cipher; side-channel analysis; MUGI; ADVANCED ENCRYPTION STANDARD; AES; ATTACK; RABBIT; PART;
D O I
10.1587/transfun.E95.A.242
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a differential fault analysis on the stream cipher MUGI, which uses two kinds of update functions of an intermediate state. MUGI was proposed by Hitachi, Ltd. in 2002 and is specified as ISO/IEC 18033-4 for keystream generation. Differential fault analysis (DFA) is a type of fault analysis, which is considered to be a serious threat against secure devices such as smart cards. DFA on MUGI was first proposed at ICISC 2010 [25]; however, the attack condition for the successful attack such as the position into which the fault is injected was restricted. In this paper, we extend the attack methods which are more practical, based on a one-byte and a multi-byte fault models using the relationship between two kinds of update functions that are mutually dependent. In the proposed attack, the attacker can know the position affected by the fault injection even if he has no control of the timing of the fault injection. As a result, a 128-bit secret key can be recovered using 13 pairs of correct and faulty outputs on average.
引用
收藏
页码:242 / 251
页数:10
相关论文
共 50 条
  • [21] Fault Detection of the Camellia Cipher against Single Byte Differential Fault Analysis
    Li, Wei
    Xia, Xiaoling
    Wang, Yi
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 951 - 957
  • [22] The differential fault analysis on block cipher KLEIN-96
    Xiao, Haiyan
    Wang, Lifang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [23] The Differential Fault Attack of PRESENT Cipher
    Chen W.-J.
    Zhao S.-Y.
    Zou R.-J.
    Zhang X.-N.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2019, 48 (06): : 865 - 869
  • [24] Differential Fault Attack on ASCON Cipher
    Jana, Amit
    PROGRESS IN CRYPTOLOGY-INDOCRYPT 2024, PT II, 2025, 15496 : 53 - 72
  • [25] Differential Attacks against Stream Cipher ZUC
    Wu, Hongjun
    Huang, Tao
    Phuong Ha Nguyen
    Wang, Huaxiong
    Ling, San
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 262 - 277
  • [26] Differential attacks against the helix stream cipher
    Muller, R
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 94 - 108
  • [27] Preventing Fault Attack on Stream Cipher using Randomization
    Ghosh, Shamit
    Chowdhury, Dipanwita Roy
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 88 - 91
  • [28] Fault Attack on FPGA implementations of Trivium Stream Cipher
    Potestad-Ordonez, F. E.
    Jimenez-Fernandez, C. J.
    Valencia-Barrero, M.
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 562 - 565
  • [29] Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
    Salam, Iftekhar
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Wong, Kenneth Koon-Ho
    CRYPTOGRAPHY, 2018, 2 (01) : 1 - 18
  • [30] Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher
    Kang, Yongze
    Yu, Qingyuan
    Qin, Lingyue
    Zhang, Guoyan
    SYMMETRY-BASEL, 2023, 15 (06):