Preventing Fault Attack on Stream Cipher using Randomization

被引:0
|
作者
Ghosh, Shamit [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] Indian Inst Technol, Kharagpur, W Bengal, India
关键词
Fault Randomization; Infective Countermeasure; Stream Cipher; DFA; Grain;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fault attacks are one of the most popular side channel attacks. It has been mounted on numerous stream ciphers successfully. Almost all the winners of the eSTREAM project have been cryptanalyzed using fault attack techniques even if they were shown to be secure against algebraic cryptanalysis techniques. Beside, very little research work exists in the contemporary literature to prevent fault attacks on stream ciphers and most of them are attack specific. This necessitates a generalized fault attack prevention technique for stream ciphers. In the current paper, fault attacks on stream ciphers are formalized and a generalized approach to thwart this kind of attacks is proposed using fault randomization. It is also proved that the proposed countermeasure nullifies the advantage of performing fault analysis techniques. We validate our scheme taking Grain-128 as crypto primitive along with FPGA implementation.
引用
收藏
页码:88 / 91
页数:4
相关论文
共 50 条
  • [1] Differential Fault Attack on the Stream Cipher LIZARD
    MA Zhen
    TIAN Tian
    QI Wenfeng
    [J]. Chinese Journal of Electronics, 2021, 30 (03) : 534 - 541
  • [2] Differential Fault Attack on the Stream Cipher LIZARD
    Ma Zhen
    Tian Tian
    Qi Wenfeng
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (03) : 534 - 541
  • [3] Fault Attack on FPGA implementations of Trivium Stream Cipher
    Potestad-Ordonez, F. E.
    Jimenez-Fernandez, C. J.
    Valencia-Barrero, M.
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 562 - 565
  • [4] Differential Distinguishing attack on the Shannon Stream Cipher Based on Fault Analysis
    Hassanzadeh, Mehdi M.
    Parker, Matthew G.
    Helleseth, Tor
    Salehani, Y. Esmaeili
    Abyaneh, Mohammad R. Sohizadeh
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 671 - +
  • [5] Fault Attack on SKINNY Cipher
    Navid Vafaei
    Sayandeep Saha
    Nasour Bagheri
    Debdeep Mukhopadhyay
    [J]. Journal of Hardware and Systems Security, 2020, 4 (4) : 277 - 296
  • [6] Floorplanning as a practical countermeasure against clock fault attack in Trivium stream cipher
    Potestad-Ordonez, F. E.
    Jimenez-Fernandez, C. J.
    Baena-Oliva, C.
    Parra-Fernandez, P.
    Valencia-Barrero, M.
    [J]. 2018 XXXIII CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS (DCIS), 2018,
  • [7] A New Attack on the LEX Stream Cipher
    Dunkelman, Orr
    Keller, Nathan
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 539 - +
  • [8] Improved Attack on WG Stream Cipher
    Mirzaei, Arash
    Dakhilalian, Mohammad
    Modarres-Hashemi, Mahmoud
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (04): : 45 - 52
  • [9] The Differential Fault Attack of PRESENT Cipher
    Chen, Wei-Jian
    Zhao, Si-Yu
    Zou, Rui-Jie
    Zhang, Xiao-Ning
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2019, 48 (06): : 865 - 869
  • [10] Preventing Fault Attacks Using Fault Randomization with a Case Study on AES
    Ghosh, Shamit
    Saha, Dhiman
    Sengupta, Abhrajit
    Chowdhury, Dipanwita Roy
    [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 343 - 355