Skip to main content

Improved Multi-Bit Differential Fault Analysis of Trivium

  • Conference paper
  • First Online:
Progress in Cryptology -- INDOCRYPT 2014 (INDOCRYPT 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8885))

Included in the following conference series:

Abstract

Very few differential fault attacks (DFA) were reported on Trivium so far. In 2012, Yupu Hu et al. [4] relaxed adversarial power and allowed faults in random area within eight neighbouring bits at random time but with the major limitation that after each fault injection, the fault positions must not be from different registers. In this paper we present a generic attack strategy that allows the adversary to challenge the cipher under different multi-bit fault models with faults at any unknown random keystream generation round even if bit arrangement of the actual cipher device is unknown and thereby removing the limitation of Yupu Hu et al. To the best of our knowledge, this paper assumes the weakest adversarial power ever considered in the open literature for DFA on Trivium. In particular, if faults are allowed in random area within nine neighbouring bits at random time anywhere in the three registers and the fault injection (at keystream generation) rounds are uniformly distributed over \(\{t,\ldots ,t+49\}\), for any unknown \(t\ge 1\), then 4 faults always break the cipher, which is a significant improvement over Yupu Hu et al.

Research supported in part by National Board for Higher Mathematics, Department of Atomic Energy, Government of India (No 2/48(10)/2013/NBHM(R.P.)/R&D II/695)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. De Cannière, C., Preneel, B.: TRIVIUM Specifications. http://www.ecrypt.eu.org/stream/p3ciphers/trivium/trivium_p3.pdf

  2. Hojsík, M., Rudolf, B.: Differential Fault Analysis of Trivium. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 158–172. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Hojsík, M., Rudolf, B.: Floating Fault Analysis of Trivium. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 239–250. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Hu, Y., Gao, J., Liu, Q., Zhang, Y.: Fault analysis of Trivium. Designs, Codes and Cryptography 62(3), 289–311 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  5. Karmakar, S., Chowdhury, D.R.: Fault Analysis of Grain Family of Stream Ciphers. IACR Cryptology ePrint Archive 2014:261 (2014)

    Google Scholar 

  6. Mohamed, M.S.E., Bulygin, S., Buchmann, J.: Using SAT Solving to Improve Differential Fault Analysis of Trivium. In: Kim, T., Adeli, H., Robles, R.J., Balitanas, M. (eds.) ISA 2011. CCIS, vol. 200, pp. 62–71. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  7. Rohani, N., Noferesti, Z., Mohajeri, J., Aref, M.R.: Guess and Determine Attack on Trivium Family. In: 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 785–790. IEEE (2010)

    Google Scholar 

  8. Sarkar, S., Banik, S., Maitra, S.: Differential Fault Attack against Grain family with very few faults and minimal assumptions. IACR Cryptology ePrint Archive 2013:494 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Avishek Adhikari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Dey, P., Adhikari, A. (2014). Improved Multi-Bit Differential Fault Analysis of Trivium. In: Meier, W., Mukhopadhyay, D. (eds) Progress in Cryptology -- INDOCRYPT 2014. INDOCRYPT 2014. Lecture Notes in Computer Science(), vol 8885. Springer, Cham. https://doi.org/10.1007/978-3-319-13039-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13039-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13038-5

  • Online ISBN: 978-3-319-13039-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics