A differential fault attack on the WG family of stream ciphers

被引:7
|
作者
Orumiehchiha, Mohammad Ali [1 ]
Rostami, Saeed [1 ]
Shakour, Elham [2 ]
Pieprzyk, Josef [3 ,4 ]
机构
[1] Res Ctr Dev Adv Technol, Tehran, Iran
[2] Zaeim Elect Ind, R&D Dept, Tehran, Iran
[3] CSIRO, Data61, Sydney, NSW, Australia
[4] Polish Acad Sci, Inst Comp Sci, Warsaw, Poland
关键词
Differential fault attack; WG family; WG-7; WG-8; WG-16; WG-29 stream cipher; CRYPTANALYSIS;
D O I
10.1007/s13389-020-00222-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
WG-l (l = 7, 8, 16, 29) are the well-known Welch-Gong (WG) stream cipher family with different key length bits. The first version named WG (WG-29) stream cipher was introduced in eSTREAM project as a cipher suitable for hardware implementations. The other variants are proposed for different applications from RFID to fast communications. This paper presents an extensive fault analysis on the WG family. Fault attacks are powerful cryptanalytic tools to analyse cryptosystems, which are not vulnerable to other known cryptographic attacks. The security model used to analyse the WG ciphers applies random faults, which are allowed to be injected by an adversary. The adversary has no control over the fault locations and their values. For each WG-l stream cipher, an adversary needs to observe a specific number of keystream bits before they are able to recover the secret key. To recover the secret key of WG-8, the adversary needs to inject about six random faults and compute the secret key with data and time complexities about 215.78 bits and 224, respectively. The adversary can recover the secret key of WG-7, WG-16 and WG-29 ciphers with time complexities 222, 242 and 264, respectively. The attacks have been verified experimentally.
引用
收藏
页码:189 / 195
页数:7
相关论文
共 50 条
  • [31] Linear Extension Cube Attack on Stream Ciphers
    Ding, Liren
    Wang, Yongjuan
    Li, Zhufeng
    [J]. MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2015, 9 : 139 - 156
  • [32] Cryptanalysis of MICKEY family of stream ciphers
    Ding, Lin
    Guan, Jie
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 936 - 941
  • [33] Differential power analysis of stream ciphers
    Fischer, W.
    Gammel, B. M.
    Kniffler, O.
    Velten, J.
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 257 - 270
  • [34] Cryptanalysis of the FLIP Family of Stream Ciphers
    Duval, Sebastien
    Lallemand, Virginie
    Rotella, Yann
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 457 - 475
  • [35] Blind Fault Attack against SPN Ciphers
    Korkikian, Roman
    Pelissier, Sylvain
    Naccache, David
    [J]. 2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 94 - 103
  • [36] Random Fault Attacks on a Class of Stream Ciphers
    Bartlett, Harry
    Dawson, Ed
    Al Mahri, Hassan Qahur
    Salam, Md. Iftekhar
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [37] A note on the improvement of a fast correlation attack on stream ciphers
    Hosobuchi, Satoshi
    Saito, Tomohiko
    Matsushima, Toshiyasu
    [J]. ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 2007, 90 (04): : 9 - 17
  • [38] An Improved Algorithm for Fast Correlation Attack on Stream Ciphers
    Wanzhi Chen
    [J]. 2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 2126 - 2129
  • [39] High order differential attack and trace attack to block ciphers
    Hu, YP
    Chen, K
    Xiao, GZ
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2001, 10 (03) : 382 - 384
  • [40] Differential Distinguishing attack on the Shannon Stream Cipher Based on Fault Analysis
    Hassanzadeh, Mehdi M.
    Parker, Matthew G.
    Helleseth, Tor
    Salehani, Y. Esmaeili
    Abyaneh, Mohammad R. Sohizadeh
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 671 - +