Paper 2014/262
Differential Fault Analysis of MICKEY Family of Stream Ciphers
Sandip Karmakar and Dipanwita Roy Chowdhury
Abstract
This paper presents differential fault analysis of the MICKEY family of stream ciphers, one of the winners of eStream project. The current attacks are of the best performance among all the attacks against MICKEY ciphers reported till date. The number of faults required with respect to state size is about 1.5 times the state size. We obtain linear equations to determine state bits. The fault model required is reasonable. The fault model is further relaxed without reproducing the faults and allowing multiple bit faults. In this scenario, more faults are required when reproduction is not allowed whereas, it has been shown that the number of faults remains same for multiple bit faults.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- MICKEY-128 2.0MICKEY v1MICKEY 2.0MICKEY-128Side Channel AttackFault Attack
- Contact author(s)
- sandip1kk @ gmail com
- History
- 2014-04-20: received
- Short URL
- https://ia.cr/2014/262
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/262, author = {Sandip Karmakar and Dipanwita Roy Chowdhury}, title = {Differential Fault Analysis of {MICKEY} Family of Stream Ciphers}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/262}, year = {2014}, url = {https://eprint.iacr.org/2014/262} }