Paper 2009/169
Floating Fault analysis of Trivium under Weaker Assumptions
Hu Yupu, Gao Juntao, and Liu Qing
Abstract
Trivium is a hardware-oriented stream cipher, and one of the finally chosen ciphers by eSTREAM project. Michal Hojsik and Bohuslav Rudolf presented an effective attack to Trivium, named floating fault analysis, at INDOCRYPT 2008. Their attack makes use of the fault injection and the fault float. In this paper, we present an improvement of this attack. Our attack is under following weaker and more practical assumptions.The fault injection can be made for the state at a random time.The positions of the fault bits are from random one of 3 NFSRs, and from a random area within 8 neighboring bits.We present a checking method, by which either the injecting time and fault positions can be determined, or the state differential at a known time can be determined. Each of these two determinations is enough for floating attack. After the determination, the attacker can averagely obtain 67.167 additional linear equations from 82 original quadratic equations, and obtain 66 additional quadratic equations from 66 original cubic equations.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. New Work
- Keywords
- Triviumstream ciphersdifferential fault analysisfault injectionfault floating
- Contact author(s)
- yphu @ mail xidian edu cn
- History
- 2009-04-20: received
- Short URL
- https://ia.cr/2009/169
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2009/169, author = {Hu Yupu and Gao Juntao and Liu Qing}, title = {Floating Fault analysis of Trivium under Weaker Assumptions}, howpublished = {Cryptology {ePrint} Archive, Paper 2009/169}, year = {2009}, url = {https://eprint.iacr.org/2009/169} }