Differential Fault Attack on the Stream Cipher LIZARD

被引:0
|
作者
MA Zhen [1 ]
TIAN Tian [1 ]
QI Wenfeng [1 ]
机构
[1] National Digital Switching System Engineering Technological Research Center
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
In this paper, we try to give a security evaluation of LIZARD stream cipher in regard to fault attacks, which, to the best of our knowledge, is the first fault analysis on LIZARD. We design a differential engine of LIZARD to track the differential trail of the keystreams. It is shown that the distributions of the keystream differences are heavily biased. Utilizing this characteristic, we propose an improved method to identify the fault location for LIZARD whose success probability approaches 1. Then we use the fault-free keystream and faulty keystreams to generate system of equations in internal state variables and solve it by SAT solver. The result shows that with 100 keystream bits, only 6 different faults are needed to recover the internal state. Finally,the comparison between LIZARD and Grain v1 shows that LIZARD is more resistable than Grain v1 in regard to fault attacks.
引用
收藏
页码:534 / 541
页数:8
相关论文
共 50 条
  • [41] Improved Guess and Determine attack on the MASHA stream cipher
    Lin DING
    Dawu GU
    Lei WANG
    Chenhui JIN
    Jie GUAN
    [J]. Science China(Information Sciences), 2021, 64 (09) : 247 - 248
  • [42] The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
    Mroczkowski, Piotr
    Szmidt, Janusz
    [J]. FUNDAMENTA INFORMATICAE, 2012, 114 (3-4) : 309 - 318
  • [43] Improved Guess and Determine attack on the MASHA stream cipher
    Lin Ding
    Dawu Gu
    Lei Wang
    Chenhui Jin
    Jie Guan
    [J]. Science China Information Sciences, 2021, 64
  • [44] Improved Guess and Determine attack on the MASHA stream cipher
    Ding, Lin
    Gu, Dawu
    Wang, Lei
    Jin, Chenhui
    Guan, Jie
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (09)
  • [45] Differential fault analysis and meet-in-the-middle attack on the block cipher KATAN32
    Zhang W.-Y.
    Liu F.
    Liu X.
    Meng S.
    [J]. Journal of Shanghai Jiaotong University (Science), 2013, 18 (2) : 147 - 152
  • [46] Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32
    张文英
    刘枫
    刘宣
    孟帅
    [J]. Journal of Shanghai Jiaotong University(Science), 2013, 18 (02) : 147 - 152
  • [47] Differential Attack With Constants On μ2 Block Cipher
    Shi, Jiali
    Li, Chao
    Liu, Guoqiang
    [J]. COMPUTER JOURNAL, 2024, 67 (01): : 195 - 209
  • [48] Higher order differential attack of a CAST cipher
    Moriai, S
    Shimoyama, T
    Kaneko, T
    [J]. FAST SOFTWARE ENCRYPTION, 1998, 1372 : 17 - 31
  • [49] Truncated Differential Attack on Block Cipher PRINCE
    Setoguchi, Satoshi
    Igarashi, Yasutaka
    Kaneko, Toshinobu
    Arai, Kenichi
    Fukushima, Seiji
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 466 - 474
  • [50] Differential Attacks against Stream Cipher ZUC
    Wu, Hongjun
    Huang, Tao
    Phuong Ha Nguyen
    Wang, Huaxiong
    Ling, San
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 262 - 277