Cryptography and Communications

, Volume 9, Issue 4, pp 523–543 | Cite as

Probabilistic signature based generalized framework for differential fault analysis of stream ciphers

  • Santanu Sarkar
  • Prakash Dey
  • Avishek Adhikari
  • Subhamoy Maitra
Article

Abstract

Differential Fault Attack (DFA) considers injection of faults and the most general set-up should take care of faults at random location and random time. Then one should be able to identify the exact location as well as the exact timing of the fault (including the multi bit ones) with the help of fault signatures. In this paper we solve the problem of DFA under a general frame-work, introducing the idea of probabilistic signatures. The method considers the Maximum Likelihood approach related to probability distributions. Our techniques subsume all the existing DFAs against the Grain family, MICKEY 2.0 and Trivium. In the process we provide improved fault attacks for all the versions of Grain family and also for MICKEY 2.0. Our generalized method successfully takes care of the cases where certain parts of the keystream bits are missing (this situation may arise for authentication purpose). In particular, we show that the unsolved problem of identifying the faults in random time for Grain 128a can be solved in this manner. Moreover, for MICKEY 2.0, our method not only provides improvement in fault identification probability but also reduces the required faults by 60 %, compared to the best known result.

Keywords

Differential attack Fault attack Grain family MICKEY 2.0 Probabilistic signatures Stream ciphers 

Mathematics Subject Classification (2010)

94A60 

References

  1. 1.
    Ågren, M., Hell, M., Johansson, T., Meier, W.: A New Version of Grain 128 with Authentication. Symmetric Key Encryption Workshop, 2011 (2011)Google Scholar
  2. 2.
    Ågren, M., Hell, M., Johansson, T., Meier. W.: Grain 128a: A New Version of Grain 128 with Optional Authentication. Int. J. Wireless Mobile Comput. 5(1), 48–59 (2011). This is the journal version of [1]Google Scholar
  3. 3.
    Babbage, S., Dodd, M.: The stream cipher MICKEY 2.0. ECRYPT Stream Cipher Project Report. Available at http://www.ecrypt.eu.org/stream/p3ciphers/mickey/mickey_p3.pdf
  4. 4.
    Banik, S., Maitra, S., Sarkar, S.: A Differential Fault Attack on the Grain Family of Stream Ciphers. CHES 2012, LNCS 7428, 122–139 (2012)MATHGoogle Scholar
  5. 5.
    Banik, S., Maitra, S., Sarkar, S.: A Differential Fault Attack on the Grain Family under Reasonable Assumptions. INDOCRYPT 2012, LNCS 7668, 191–208 (2012)MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Banik, S., Maitra, S.: A Differential Fault Attack on MICKEY 2.0. CHES 2013, LNCS 8086, 215–232 (2013)MATHGoogle Scholar
  7. 7.
    Banik, S., Maitra, S., Sarkar, S.: Improved Differential Fault Attack on MICKEY 2.0. J. Cryptogr. Eng. http://link.springer.com/article/10.1007%2Fs13389-014-0083-9
  8. 8.
    Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures. Proc. IEEE 100(11), 3056–3076 (2012)CrossRefGoogle Scholar
  9. 9.
    Biham, E., Dunkelman, O.: Differential Cryptanalysis in Stream Ciphers Cryptology ePrint Archive, Report 2007/218Google Scholar
  10. 10.
    Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In CRYPTO 1997, LNCS, vol. 1294Google Scholar
  11. 11.
    CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. http://competitions.cr.yp.to/caesar.html
  12. 12.
    De Cannière, C., Preneel, B.: TRIVIUM - a stream cipher construction inspired by block cipher design principles. eSTREAM, ECRYPT Stream Cipher ProjectGoogle Scholar
  13. 13.
    Dey, P., Adhikari, A.: Improved Multi-Bit Differential Fault Analysis of Trivium. INDOCRYPT 2014, LNCS 8885, 37–52 (2014)MathSciNetMATHGoogle Scholar
  14. 14.
    Dey, P., Chakraborty, A., Adhikari, A., Mukhopadhyay, D.: Multi-Bit Differential Fault Analysis of Grain 128 with Very Weak Assumptions. DATE (2015)Google Scholar
  15. 15.
    Faust, S., Mukherjee, P., Venturi, D., Wichs, D.: Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits. Cryptology ePrint Archive: Report 2013/702. http://eprint.iacr.org/2013/702, EUROCRYPT 2014. LNCS 8441, 111–128 (2014)Google Scholar
  16. 16.
    Hell, M., Johansson, T., Maximov, A., Meier, W.: A Stream Cipher Proposal, Grain 128, http://www.ecrypt.eu.org/stream/p3ciphers/grain/Grain128_p3.pdf (2005)Google Scholar
  17. 17.
    Hell, M., Johansson, T., Meier, W.: Grain - A Stream Cipher for Constrained Environments. ECRYPT Stream Cipher Project Report 2005/001, 2005. Available at, http://www.ecrypt.eu.org/stream
  18. 18.
    Hojsík, M., Rudolf, B.: Differential Fault Analysis of Trivium. FSE 2008, LNCS 5086, 158–172 (2008)MATHGoogle Scholar
  19. 19.
    SAGE: Open Source Mathematics Software. Available at http://www.sagemath.org/
  20. 20.
    Sarkar, S., Banik, S., Maitra, S.: Differential Fault Attack against Grain family with very few faults and minimal assumptions. IEEE Trans. Comput. 64(6), 1647–1657 (2015)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Santanu Sarkar
    • 1
  • Prakash Dey
    • 2
  • Avishek Adhikari
    • 2
  • Subhamoy Maitra
    • 3
  1. 1.Department of MathematicsIndian Institute of Technology MadrasChennaiIndia
  2. 2.Department of Pure MathematicsUniversity of CalcuttaKolkataIndia
  3. 3.Indian Statistical InstituteKolkataIndia

Personalised recommendations