1,012 research outputs found
Differential Fault Analysis of MICKEY Family of Stream Ciphers
This paper presents differential fault analysis of the
MICKEY family of stream ciphers, one of the winners of eStream
project. The current attacks are of the best performance among
all the attacks against MICKEY ciphers reported till date. The
number of faults required with respect to state size is about
1.5 times the state size. We obtain linear equations to determine
state bits. The fault model required is reasonable. The fault model
is further relaxed without reproducing the faults and allowing
multiple bit faults. In this scenario, more faults are required
when reproduction is not allowed whereas, it has been shown
that the number of faults remains same for multiple bit faults
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
This work exploits internal differentials within a cipher in the context of Differential Fault Analysis (DFA). This in turn overcomes the nonce barrier which acts as a natural counter-measure against DFA. We introduce the concept of internal differential fault analysis which requires only one faulty ciphertext. In particular, the analysis is applicable to parallelizable ciphers that use the counter-mode. As a proof of concept we develop an internal differential fault attack called EnCounter on PAEQ which is an AES based parallelizable authenticated cipher presently in the second round of on-going CAESAR competition. The attack is able to uniquely retrieve the key of three versions of full-round PAEQ of key-sizes 64, 80 and 128 bits with complexities of about , and respectively. Finally, this work addresses in detail the instance of fault analysis with varying amounts of partial state information and also presents the first analysis of PAEQ
Fault Analysis of Grain Family of Stream Ciphers
In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The earlier fault attacks on Grain work on LFSR whereas our target for fault induction is the NFSR. Our attack requires a small number of faults to be injected; 150 only for Grain v1 and only 312 and 384 for Grain-128 and Grain-128a, respectively. The number of faults are much lesser than the earlier reported fault attacks; 1587 for Grain-128 and 1831 for Grain-128a
NOCAS : A Nonlinear Cellular Automata Based Stream Cipher
LFSR and NFSR are the basic building blocks in almost all the state of the art stream ciphers like Trivium and Grain-128. However, a number of attacks are mounted on these type of ciphers. Cellular Automata (CA) has recently been chosen as a suitable structure for crypto-primitives. In this work, a stream cipher is presented based on hybrid CA. The stream cipher takes 128 bit key and 128 bit initialization vector (IV) as input. It is designed to produce random keystream bits and initialization phase is made faster 4 times than that of Grain-128. We also analyze the cryptographic strength of this cipher. Finally, the proposed cipher is shown to be resistant against known existing attacks
A Generic Scan Attack on Hardware based eStream Winners
Scan chains, a design for testability (DFT)
feature, are included in most modern-day ICs. But, it
opens a side channel for attacking cryptographic chips.
We propose a methodology by which we can recover
internal states of any stream cipher using scan chains
without knowledge of its design. We consider conven-
tional scan-chain design which is normally not scram-
bled or protected in any other way. In this scenario
the challenge of the adversary is to obtain the corre-
spondence of output of the scan chain and the internal
state registers of the stream cipher. We present a math-
ematical model of the attack and the correspondence
between the scan chain-outputs and the internal state
bits have been proved under this model. We propose an
algorithm that through o-line and on-line simulation
forms bijection between the above mentioned sets and
thus nds the required correspondence. We also give an
estimate of the number of o-line simulations necessary
for nding the correspondence.
The proposed strategy is successfully applied to eS-
tream hardware based nalists MICKEY-128 2.0, Triv-
ium and Grain-128. To the best of our knowledge, this is
the rst scan based attack against full round Grain-128
and only the fourth reported cryptanalysis. This attack
on Trivium is better than that of the published scan-
attack on Trivium. This scan-based attack is also the
rst reported scan based cryptanalysis against MICKEY-
128 2.0
ZETA: Towards Tagless Authenticated Encryption
Tag-based message authentication is a popular cryptographic technique to digitally sign messages. However, for short messages, it often incurs additional costs due to large tags. In this paper, we propose a new scheme that achieves tagless message authentication. The scheme leverages a trade-off between character support and complexity of forgery to provide information security and authenticity
Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack
This paper deals with the differential power attack on a pairing cryptoprocessor. The cryptoprocessor is designed for pairing computations on elliptic curves defined over finite fields with large prime characteristic. The work pinpoints the vulnerabilities of such pairing computations against side-channel attacks. By exploiting the power consumptions, the paper experimentally demonstrates such vulnerability on FPGA platform. A suitable counteracting technique is also suggested to overcome such vulnerability
Deep Learning based Differential Classifier of PRIDE and RC5
Deep learning-based cryptanalysis is one of the emerging
trends in recent times. Differential cryptanalysis is one of the most po-
tent approaches to classical cryptanalysis. Researchers are now modeling
classical differential cryptanalysis by applying deep learning-based tech-
niques. In this paper, we report deep learning-based differential distin-
guishers for block cipher PRIDE and RC5, utilizing deep learning models:
CNN, LGBM and LSTM. We found distinguishers up to 23 rounds for
PRIDE and nine rounds for RC5. To the best of our knowledge this is
the first deep learning based differential classifier for cipher PRIDE and
RC5
A Deep Neural Differential Distinguisher for ARX based Block Cipher
Over the last few years, deep learning is becoming the most
trending topic for the classical cryptanalysis of block ciphers. Differential
cryptanalysis is one of the primary and potent attacks on block ciphers.
Here we apply deep learning techniques to model differential cryptanaly-
sis more easily. In this paper, we report a generic tool called NDDT1, us-
ing deep neural classifier that assists to find differential distinguishers for
symmetric block ciphers with reduced round. We apply this approach for
the differential cryptanalysis of ARX-based encryption schemes HIGHT,
LEA, SPARX and SAND. To the best of our knowledge, this is the
first deep learning-based distinguisher for the mentioned ciphers. The
result shows that our deep learning based distinguishers work with high
accuracy for 14-round HIGHT, 13-Round LEA, 11-round SPARX and
14-round SAND128. The relationship between the hamming weight of
input difference of a neural distinguisher and the corresponding maxi-
mum round number of the cipher has been justified through exhaustive
experimentation. The lower bounds of data complexity for differential
cryptanalysis have also been improved
- …