DFA countermeasure method for LFSR-based stream ciphers and fault detection circuit

被引:0
|
作者
Shyrochyn, Valery [1 ]
Vasyltsov, Hor [2 ]
Karpinskij, Bohdan [2 ]
Kurtjak, Volodymyr [2 ]
机构
[1] Natl Tech Univ, Kyivsky Politech Inst, Informat & Comp Tech Dept, Pr Pobbey 37, UA-03056 Kiev, Ukraine
[2] Ternopil State Econ Univ, Dept Informat Technol Secur, UA-46004 Ternopol, Ukraine
关键词
stream cipher; reconfigurable LFSR; fault insertion attacks; countermeasures;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper the method to counter differential fault analysis attack on LFSR-based stream ciphers have been proposed. The realization of the proposed method in the stream ciphers, based on reconfigurable LFSR are much more efficient than traditional hardware-oriented redundant technique. For real world application fault detection circuit has been developed. The overheads for the proposed DFA countermeasure method realization have been analyzed.
引用
收藏
页码:309 / +
页数:2
相关论文
共 50 条
  • [2] A fast correlation attack for LFSR-based stream ciphers
    Palit, S
    Roy, BK
    De, A
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 331 - 342
  • [3] Cache Timing Analysis of LFSR-Based Stream Ciphers
    Leander, Gregor
    Zenner, Erik
    Hawkes, Philip
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2009, 5921 : 433 - +
  • [4] Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers
    Canales-Martinez, Isaac A.
    Semaev, Igor
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (11) : 3391 - 3427
  • [5] A General Correlation Evaluation Model on LFSR-Based Stream Ciphers
    Shi, Zhen
    Jin, Chenhui
    Zhang, Jiyan
    Cui, Ting
    Ding, Lin
    Jin, Yu
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (10) : 6682 - 6699
  • [6] Quantum Algorithms for Fast Correlation Attacks on LFSR-Based Stream Ciphers
    Hosoyamada, Akinori
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VIII, 2025, 15491 : 396 - 430
  • [7] A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter
    Zhong, Xiao
    Wang, Mingsheng
    Zhang, Bin
    Wu, Shengbao
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 132 - 142
  • [8] Improvement of the edit distance attack to clock-controlled LFSR-based stream ciphers
    Caballero-Gil, P
    Fúster-Sabater, A
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2005, 2005, 3643 : 355 - 364
  • [9] LFSR based stream ciphers are vulnerable to power attacks
    Burman, Sanjay
    Nlukhopadhyay, Debdeep
    Veezhinathan, Kamakoti
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 384 - +
  • [10] Security Analyses of Different LFSR-Based Ciphers to Propose a Novel Approach Compatible with Parallel Computing Platform, Providing Resistance Against Various LFSR-Based Attacks
    Shah, Trishla
    Upadhyay, Darshana
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 347 - 359