Cryptology ePrint Archive: Report 2015/508
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
Santanu Sarkar and Prakash Dey and Avishek Adhikari and Subhamoy Maitra
Abstract: Differential Fault Attack (DFA) has received serious attention in cryptographic literature and very recently
such attacks have been mounted against several popular stream ciphers for example Grain v1, MICKEY 2.0
and Trivium, that are parts of the eStream hardware profile. The basic idea of the fault attacks consider
injection of faults and the most general set-up should consider faults at random location and random time.
Then one should identify the exact location and the exact timing of the fault (as well as multi bit faults) with the help of fault signatures.
In this paper we consider this most general set-up and solve the problem of fault attack under a general framework,
where probabilistic signatures are exploited. Our ideas subsume all the existing DFAs against the Grain family,
MICKEY 2.0 and Trivium. In the process we provide improved fault attacks for all the versions of Grain family and also
for MICKEY 2.0 (the attacks against Trivium are already quite optimal and thus there is not much scope to improve).
Our generalized method can also take care of the cases where certain parts of the keystream bits are missing
for authentication purpose. In particular, we show that the unsolved problem of identifying the faults
in random time for Grain 128a can be solved in this manner. Our techniques can easily be applied to mount fault
attack on any stream cipher of similar kind.
Category / Keywords: secret-key cryptography / Differential Attack, Fault Attack, Grain Family, MICKEY 2.0, Probabilistic Signatures, Stream ciphers.
Date: received 27 May 2015
Contact author: avishek adh at gmail com
Available format(s): PDF | BibTeX Citation
Version: 20150527:192253 (All versions of this report)
Short URL: ia.cr/2015/508
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]