Chapter

Cryptographic Hardware and Embedded Systems - CHES 2013

Volume 8086 of the series Lecture Notes in Computer Science pp 215-232

A Differential Fault Attack on MICKEY 2.0

  • Subhadeep BanikAffiliated withApplied Statistics Unit, Indian Statistical Institute Kolkata
  • , Subhamoy MaitraAffiliated withApplied Statistics Unit, Indian Statistical Institute Kolkata

* Final gross prices may vary according to local VAT.

Get Access

Abstract

In this paper we present a differential fault attack on the stream cipher MICKEY 2.0 which is in eStream’s hardware portfolio. While fault attacks have already been reported against the other two eStream hardware candidates Trivium and Grain, no such analysis is known for MICKEY. Using the standard assumptions for fault attacks, we show that if the adversary can induce random single bit faults in the internal state of the cipher, then by injecting around 216.7 faults and performing 232.5 computations on an average, it is possible to recover the entire internal state of MICKEY at the beginning of the key-stream generation phase. We further consider the scenario where the fault may affect at most three neighbouring bits and in that case we require around 218.4 faults on an average.

Keywords

eStream Fault attacks MICKEY 2.0 Stream Cipher