Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers

被引:2
|
作者
Beckers, Arthur [1 ]
Gierlichs, Benedikt [1 ]
Verbauwhede, Ingrid [1 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Kasteelpk Arenberg 10, B-3001 Leuven, Belgium
基金
欧盟地平线“2020”;
关键词
ChaCha; Salsa; Stream cipher; Fault analysis; ATTACKS;
D O I
10.1007/978-3-319-75208-2_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these families of stream ciphers. Then we propose two novel fault attacks that can be used against any variant of the ciphers. We base our attacks on two different fault models: the stuck-at fault model and the biased fault model. Each of them is exploited differently by the attacker. If the attacker knows the plaintexts and the ciphertexts both fault models can be successfully exploited. If the ciphers operate on fixed yet unknown plaintexts only the biased fault model can be successfully exploited. We evaluate exemplary attacks using both models in simulation. Their low complexity confirms that they are practical. To the best of our knowledge these are the first fault attacks against ChaCha and Salsa that do not require faults in the control flow (e.g. instruction skip).
引用
收藏
页码:196 / 212
页数:17
相关论文
共 50 条
  • [31] Improved related-cipher attack on Salsa and ChaCha: revisited
    Deepthi Kakumani K.C.
    Singh K.
    Karthika S.K.
    International Journal of Information Technology, 2022, 14 (3) : 1535 - 1542
  • [32] Differential Random Fault Attacks on Certain CAESAR Stream Ciphers
    Wong, Kenneth Koon-Ho
    Bartlett, Harry
    Simpson, Leonie
    Dawson, Ed
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 297 - 315
  • [33] PNB Based Differential Cryptanalysis of Salsa20 and ChaCha
    Ghafoori, Nasratullah
    Miyaji, Atsuko
    Ito, Ryoma
    Miyashita, Shotaro
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (09) : 1407 - 1422
  • [34] Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha
    Coutinho, Murilo
    Souza Neto, Tertuliano C.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 711 - 740
  • [35] STREAM CIPHERS
    PIPER, F
    LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 181 - 188
  • [36] Improved fault analysis on SIMECK ciphers
    Le, Duc-Phong
    Lu, Rongxing
    Ghorbani, Ali A.
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (02) : 169 - 180
  • [37] Improved fault analysis on SIMECK ciphers
    Duc-Phong Le
    Rongxing Lu
    Ali A. Ghorbani
    Journal of Cryptographic Engineering, 2022, 12 : 169 - 180
  • [38] Differential power analysis of stream ciphers with LFSRs
    Qu, Bo
    Gu, Dawu
    Guo, Zheng
    Liu, Junrong
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1291 - 1299
  • [39] On Analysis of Lightweight Stream Ciphers with Keyed Update
    Kara, Orhun
    Esgin, Muhammed F.
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (01) : 99 - 110
  • [40] An analysis of the Hermes8 Stream Ciphers
    Babbage, Steve
    Cid, Carlos
    Pramstaller, Norbert
    Raddum, Havard
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 1 - +