Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers

被引:2
|
作者
Beckers, Arthur [1 ]
Gierlichs, Benedikt [1 ]
Verbauwhede, Ingrid [1 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Kasteelpk Arenberg 10, B-3001 Leuven, Belgium
基金
欧盟地平线“2020”;
关键词
ChaCha; Salsa; Stream cipher; Fault analysis; ATTACKS;
D O I
10.1007/978-3-319-75208-2_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these families of stream ciphers. Then we propose two novel fault attacks that can be used against any variant of the ciphers. We base our attacks on two different fault models: the stuck-at fault model and the biased fault model. Each of them is exploited differently by the attacker. If the attacker knows the plaintexts and the ciphertexts both fault models can be successfully exploited. If the ciphers operate on fixed yet unknown plaintexts only the biased fault model can be successfully exploited. We evaluate exemplary attacks using both models in simulation. Their low complexity confirms that they are practical. To the best of our knowledge these are the first fault attacks against ChaCha and Salsa that do not require faults in the control flow (e.g. instruction skip).
引用
收藏
页码:196 / 212
页数:17
相关论文
共 50 条
  • [1] VLSI Hardware Evaluation of the Stream Ciphers Salsa20 and ChaCha, and the Compression Function Rumba
    Henzen, L.
    Carbognani, F.
    Felber, N.
    Fichtner, W.
    SCS: 2008 2ND INTERNATIONAL CONFERENCE ON SIGNALS, CIRCUITS AND SYSTEMS, 2008, : 223 - 227
  • [2] Fault analysis of stream ciphers
    Hoch, JJ
    Shamir, A
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 240 - 253
  • [3] Revisited Diffusion Analysis of Salsa and ChaCha
    Matsuoka, Yusuke
    Miyaji, Atsuko
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 452 - 456
  • [4] Study And Analysis of eSTREAM Cipher Salsa And ChaCha
    Yadav, Prateek
    Gupta, Indivar
    Murthy, S. K.
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 90 - 94
  • [5] Improved analysis for reduced round Salsa and Chacha
    Dey, Sabyasachi
    Sarkar, Santanu
    DISCRETE APPLIED MATHEMATICS, 2017, 227 : 58 - 69
  • [6] Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure
    Fukushima, Kazuhide
    Xu, Rui
    Kiyomoto, Shinsaku
    Homma, Naofumi
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1032 - 1037
  • [7] Cryptanalysis of Salsa and ChaCha: Revisited
    Deepthi, Kakumani K. C.
    Singh, Kunwar
    MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 324 - 338
  • [8] Hardware implementation of the Salsa20 and Phelix stream ciphers
    Yan, Junjie
    Heys, Howard M.
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1125 - 1128
  • [9] Differential Fault Analysis on the Families of SIMON and SPECK Ciphers
    Tupsamudre, Harshal
    Bisht, Shikha
    Mukhopadhyay, Debdeep
    2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 40 - 48
  • [10] New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
    Aumasson, Jean-Philippe
    Fischer, Simon
    Khazaei, Shahram
    Meier, Willi
    Rechberger, Christian
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 470 - +