Fault Analysis on Stream Cipher MUGI

被引:0
|
作者
Takahashi, Junko [1 ,2 ]
Fukunaga, Toshinori [1 ]
Sakiyama, Kazuo [2 ]
机构
[1] NTT Corp, NTT Informat Sharing Platform Labs, 3-9-11 Midori Cho, Musashino, Tokyo 1808585, Japan
[2] Univ Elect Commun, Dept Informat, Tokyo 1828585, Japan
关键词
Fault analysis; Differential fault analysis (DFA); Stream cipher; Side-channel analysis; AES; ENCRYPTION; RABBIT; CLEFIA; PART;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes differential fault analysis, which is a well-known type of fault analysis, on a stream cipher MUGI, which uses two kinds of update functions of an intermediate state. MUM was proposed by Hitachi, Ltd. in 2002 and it is specified as ISO/IEC 18033-4 for keystream generation. Fault analysis is a side-channel attack that uses the faulty output obtained by inducing faults into secure devices. To the best knowledge of the authors, this is the first paper that proposes applying fault analysis to MUM. The proposed attack uses the relation between two kinds of the update functions that are mutually dependent. As a result, our attack can recover a 128-bit secret key using 12.54 pairs of correct and faulty outputs on average within 1 sec.
引用
收藏
页码:420 / +
页数:5
相关论文
共 50 条
  • [1] Differential Fault Analysis on Stream Cipher MUGI
    Takahashi, Junko
    Fukunaga, Toshinori
    Sakiyama, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 242 - 251
  • [2] Rekeying issues in the MUGI stream cipher
    Henricksen, M
    Dawson, E
    SELECTED AREAS IN CRYPTOGRAPHY, 2006, 3897 : 175 - 188
  • [3] A weakness of the linear part of stream cipher MUGI
    Golic, JD
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 178 - 192
  • [4] A weakness of the linear part of stream cipher MUGI
    Golić, Jovan Dj.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3017 : 178 - 192
  • [5] Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI
    Du, Shaoyu
    Li, Zhenqi
    Zhang, Bin
    Lin, Dongdai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 235 - 249
  • [6] Differential fault analysis on the stream cipher LEX
    Zhang, Zhong-Ya
    Guan, Jie
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2012, 46 (06): : 865 - 869
  • [7] Fault Analysis of the Stream Cipher Snow 3G
    Debraize, Blandine
    Corbella, Irene Marquez
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 103 - +
  • [8] Fault Analysis of the Stream Cipher Snow 3G
    Debraize, Blandine
    Corbella, Irene Marquez
    PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 103 - +
  • [9] Fault Attacks on Stream Cipher Scream
    Du, Shaoyu
    Zhang, Bin
    Li, Zhenqi
    Lin, Dongdai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 50 - 64
  • [10] Differential Distinguishing attack on the Shannon Stream Cipher Based on Fault Analysis
    Hassanzadeh, Mehdi M.
    Parker, Matthew G.
    Helleseth, Tor
    Salehani, Y. Esmaeili
    Abyaneh, Mohammad R. Sohizadeh
    2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 671 - +