You are looking at a specific version 20130124:210634 of this paper. See the latest version.

Paper 2013/029

A Differential Fault Attack on MICKEY 2.0

Subhadeep Banik and Subhamoy Maitra

Abstract

In this paper we present a differential fault attack on the stream cipher MICKEY 2.0 which is in eStream's hardware portfolio. While fault attacks have already been reported against the other two eStream hardware candidates Trivium and Grain, no such analysis is known for MICKEY. Using the standard assumptions for fault attacks, we show that by injecting around $2^{16.7}$ faults and performing $2^{32.5}$ computations on an average, it is possible to recover the entire internal state of MICKEY at the beginning of the key-stream generation phase.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
eStreamFault attacksMICKEY 2.0Stream Cipher
Contact author(s)
subho @ isical ac in
History
2014-01-29: revised
2013-01-24: received
See all versions
Short URL
https://ia.cr/2013/029
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.