Differential Fault Attack on the Stream Cipher LIZARD

来源 :电子学报(英文版) | 被引量 : 0次 | 上传用户:silverfox
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In this paper, we try to give a security evaluation of LIZARD stream cipher in regard to fault attacks, which, to the best of our knowledge, is the first fault analysis on LIZARD. We design a differential engine of LIZARD to track the differential trail of the keystreams. It is shown that the distributions of the keystream differences are heavily biased. Utilizing this characteristic, we propose an improved method to identify the fault location for LIZARD whose success probability approaches 1. Then we use the fault-free keystream and faulty keystreams to generate system of equations in internal state variables and solve it by SAT solver. The result shows that with 100 keystream bits, only 6 different faults are needed to recover the internal state. Finally, the comparison between LIZARD and Grain v1 shows that LIZARD is more resistable than Grain v1 in regard to fault attacks.
其他文献
An algorithm for output spectrum analysis of nonlinear system with correlative sources is proposed. First, the output terms of nonlinear system are analyzed bas
Automated human facial image deidentification is a much-needed technology for privacypreserving social media and intelligent surveillance applications. We propose a novel utility preserved facial imag
Service-based architecture (SBA) is a profound advancement in the novel 5G Core network (5GC). Existing studies show that SBA can benefit from cloud computing t
Network on a chip (NoC) uses packet-switched network to implement interconnections in System on chip (SoC). In SoC design, performance and energy efficiency are
Inspired by the self-similar fractal proper-ties of chaotic attractors and the heuristics of similarity filtering of images, a novel chaotic signal denoising al
In order to reduce the volume, weight and cost of conventional hybrid energy storage system (HESS) while properly exploring the complementary features of differ
Automatic identification of intracranial electroencephalogram (iEEG) signals has become more and more important in the field of medical diagnostics. In this pap
Electric drive system with Insulated gate bipolar transistor (IGBT) power device is widely used in Electric vehicle (EV), which consists of inverter, cables and
Power analysis methods are commonly used for evaluating the security of cryptographic devices. They are characteristically low-cost and display a high success r
This paper presents a Very large scale integration (VLSI) design method for Three-dimensional (3D) depth perception chip based on infrared coding structure ligh