2006
DOI: 10.1007/11764298_6
|View full text |Cite
|
Sign up to set email alerts
|

Fault Cryptanalysis and the Shrinking Generator

Abstract: Abstract. We present two efficient and simple fault attacks on the shrinking generator. In a first case if the attacker can stop control generator for some small number of steps and observe the output, then with high probability he can deduce the full control sequence, and so the other input bitstream. The second method assumes that the attacker can disturb the control sequence (in an unpredictable and random way) and observe many samples of such experiments. Then he can reconstruct a certain sequence that agr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Other attacks against the shrinking generator have been designed in the literature. For example, in [18], the authors proposed two fault cryptoanalysis. In that work, the attacker is supposed to have a device implementing the shrinking generator and can use it freely.…”
Section: Other Attacks Over the Shrinking Generatormentioning
confidence: 99%
“…Other attacks against the shrinking generator have been designed in the literature. For example, in [18], the authors proposed two fault cryptoanalysis. In that work, the attacker is supposed to have a device implementing the shrinking generator and can use it freely.…”
Section: Other Attacks Over the Shrinking Generatormentioning
confidence: 99%
“…This model tries to reflect a situation in which the cryptanalyst is in possession of the physical device, and the faults are transient rather than permanent. We adapt the methods in [15,18] to Mixer. Assume that the cryptanalyst has a device implementing Mixer and can use it freely.…”
Section: Fault Attackmentioning
confidence: 99%