Abstract
A fault attack is a powerful cryptanalytic tool which can be applied to many types of cryptosystems which are not vulnerable to direct attacks. The research literature contains many examples of fault attacks on public key cryptosystems and block ciphers, but surprisingly we could not find any systematic study of the applicability of fault attacks to stream ciphers. Our goal in this paper is to develop general techniques which can be used to attack the standard constructions of stream ciphers based on LFSR’s, as well as more specialized techniques which can be used against specific stream ciphers such as RC4, LILI-128 and SOBER-t32. While most of the schemes can be successfully attacked, we point out several interesting open problems such as an attack on FSM filtered constructions and the analysis of high Hamming weight faults in LFSR’s.
Chapter PDF
Similar content being viewed by others
References
Anderson, R.: Optical Fault Induction (June 2002)
Boneh, Demillo, Lipton: On the Importance of Checking Cryptographic Prtocols for Faults (September 1996)
Biham, Shamir: A New Cryptanalytic Attack on DES: Differential Fault Analysis (October 1996)
Dawson, E., Clark, A., Golic, J., Millan, W., Penna, L., Simpson, L.: The LILI-128 Keystream Generator (November 2000)
Halevi, S., Coppersmith, D., Jutla, C.: Scream an efficient stream cipher (June 2002)
Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 22–39. Springer, Heidelberg (1994)
Hawks, P., Rose, G.G.: Primitive Specification and Supporting Documentation for SOBER-t32 Submission to NESSIE (June 2003)
Mantin, I., Shamir, A.: A Practical Attack on Broadcast RC4. FSE 2001
Golic, J.D., Morgari, G.: On the Resynchronization Attack. FSE 2003
Golic, J.D., Morgari, G.: Correlation Analysis of the Alternating Step Generator. Designs, Codes and Cryptography 31, 51–74 (2004)
Dubuc, S.: Characterization of linear structures. Designs, Codes and Cryptography 22, 33–45 (2001)
Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Eurocrypt 2003 (2003)
Babbage, S.: Cryptanalysis of LILI-128. In: Proceedings of the 2nd NESSIE Workshop (2001)
Babbage, S., De Cannière, C., Lano, J., Preneel, B., Vandewalle, J.: Cryptanalysis of SOBER-t32. In: FSE 2003 (2003)
Cho, J.Y., Pieprzyk, J.: Algebraic Attacks on SOBER-t32 and SOBER- 128. In: FSE 2004
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hoch, J.J., Shamir, A. (2004). Fault Analysis of Stream Ciphers. In: Joye, M., Quisquater, JJ. (eds) Cryptographic Hardware and Embedded Systems - CHES 2004. CHES 2004. Lecture Notes in Computer Science, vol 3156. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28632-5_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-28632-5_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22666-6
Online ISBN: 978-3-540-28632-5
eBook Packages: Springer Book Archive