2019
DOI: 10.1155/2019/1680263
|View full text |Cite
|
Sign up to set email alerts
|

Random Fault Attacks on a Class of Stream Ciphers

Abstract: In this paper, we show that stream ciphers with a particular form of ciphertext output function are vulnerable to differential fault attacks using random faults. The CAESAR competition candidates Tiaoxin-346 and AEGIS-128L both fall into this category, and we show that our attack can be used to recover the secret key of Tiaoxin-346 and the entire state of AEGIS-128L with practical complexity. In the case of AEGIS-128L, the attack can be applied in a ciphertext-only scenario. Our attacks are more practical than… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Fault attacks can pose a significant threat to a wide range of industries, including banking, defense, and critical infrastructure. They have been shown to be a powerful technique against many modern ciphers; for examples of fault attacks on stream ciphers, refer to the provided references [14,15,[15][16][17][18][19][20][21][22][23] . Fault attacks can be measured by four parameters: the fault type, duration, number, and precision [4,24] .…”
Section: Fault Attackmentioning
confidence: 99%
“…Fault attacks can pose a significant threat to a wide range of industries, including banking, defense, and critical infrastructure. They have been shown to be a powerful technique against many modern ciphers; for examples of fault attacks on stream ciphers, refer to the provided references [14,15,[15][16][17][18][19][20][21][22][23] . Fault attacks can be measured by four parameters: the fault type, duration, number, and precision [4,24] .…”
Section: Fault Attackmentioning
confidence: 99%
“…Therefore, the PLR becomes weaker, reducing the number of vehicle nodes in our traffic VANET. By comparing it with the FLIP scheme [80], the two proposed schemes offer a lower PLR. Also, with the same load conditions, the two proposed schemes (SDN) and (SPS) are better in terms of PLR compared to the Identity-Based Conditional Privacy-Preserving Authentication Scheme (IBCPA) [81].…”
Section: Figure 10 Packet Delivery Ratio (Pdr)mentioning
confidence: 99%
“…functions to identify target fault registers. To illustrate the probabilistic random fault attack, consider the keystream function given by Equation (10). Assume that an adversary injects a random fault at the register s 383 14 .…”
Section: ) Attack Descriptionmentioning
confidence: 99%
“…This technique has been used to analyze the CAESAR candidates Tiaoxin-346 and AEGIS and the NIST LWC candidate TRIAD (see [9], [10], [22]). Note that in the works cited above, the impact of the fault is random but the attack still requires precise information about fault timing and location.…”
Section: ) Attack Descriptionmentioning
confidence: 99%
See 1 more Smart Citation