2011
DOI: 10.1007/978-3-642-23141-4_7
|View full text |Cite
|
Sign up to set email alerts
|

Using SAT Solving to Improve Differential Fault Analysis of Trivium

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 9 publications
0
23
0
Order By: Relevance
“…The basic idea of AFA is to convert both the cipher and the injected faults into algebraic equations and recover the secret key with automated solvers such as SAT instead of the manual analysis on fault propagations in DFA, hence making it easier to extend AFA to deep rounds and different ciphers and fault models. AFA has been successfully used to improve DFA on the stream ciphers such as Trivium [19] and Grain [20] and block ciphers such as AES [21], LED [22,23], KASUMI [24], and Piccolo [25].…”
Section: Security and Communication Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…The basic idea of AFA is to convert both the cipher and the injected faults into algebraic equations and recover the secret key with automated solvers such as SAT instead of the manual analysis on fault propagations in DFA, hence making it easier to extend AFA to deep rounds and different ciphers and fault models. AFA has been successfully used to improve DFA on the stream ciphers such as Trivium [19] and Grain [20] and block ciphers such as AES [21], LED [22,23], KASUMI [24], and Piccolo [25].…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…Our aim is to fully recover the entire master key, which is mainly depending on solving the two equations (19) and (20) in Section 4. Our task is to investigate the number of queries ( , ) and (0, ) to solve the equations.…”
Section: Data Complexity Analysismentioning
confidence: 99%
“…22 9248. 13 Table 4. Results of our attack using only a one-bit fault injection Table 4 reports our experiments.…”
Section: Resultsmentioning
confidence: 99%
“…As a result, we present a more practical algebraic differential fault attack called Mutant DFA (MDFA). Specifically, instead of addressing the gathered DFA information with just one particular algebraic technique as suggested in [11] and [13], we combine several algebraic techniques. In this way we benefit from the advantages of each individual technique.…”
Section: Our Contributionmentioning
confidence: 99%
See 1 more Smart Citation