A Differential Fault Attack on MICKEY 2.0

被引:0
作者
Banik, Subhadeep [1 ]
Maitra, Subhamoy [1 ]
机构
[1] Indian Stat Inst Kolkata, Appl Stat Unit, 203 BT Rd, Kolkata 108, India
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013 | 2013年 / 8086卷
关键词
eStream; Fault attacks; MICKEY; 2.0; Stream Cipher;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present a differential fault attack on the stream cipher MICKEY 2.0 which is in eStream's hardware portfolio. While fault attacks have already been reported against the other two eStream hardware candidates Trivium and Grain, no such analysis is known for MICKEY. Using the standard assumptions for fault attacks, we show that if the adversary can induce random single bit faults in the internal state of the cipher, then by injecting around 2(16.7) faults and performing 2(32.5) computations on an average, it is possible to recover the entire internal state of MICKEY at the beginning of the key-stream generation phase. We further consider the scenario where the fault may affect at most three neighbouring bits and in that case we require around 2(18.4) faults on an average.
引用
收藏
页码:215 / 232
页数:18
相关论文
共 18 条
[11]  
Gierlichs B., 2008, P SASC 2008
[12]  
Hoch JJ, 2004, LECT NOTES COMPUT SC, V3156, P240
[13]  
Hojsík M, 2008, LECT NOTES COMPUT SC, V5086, P158
[14]  
Hojsík M, 2008, LECT NOTES COMPUT SC, V5365, P239, DOI 10.1007/978-3-540-89754-5_19
[15]  
Hong J, 2005, LECT NOTES COMPUT SC, V3797, P169
[16]  
Karmakar S, 2011, LECT NOTES COMPUT SC, V6737, P298, DOI 10.1007/978-3-642-21969-6_19
[17]  
Skorobogatov S, 2006, LECT NOTES COMPUT SC, V4249, P61
[18]  
Skorobogatov SP, 2002, LECT NOTES COMPUT SC, V2523, P2