Efficient algorithms for solving overdefined systems of multivariate polynomial equations
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Floating Fault Analysis of Trivium
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Fault Analysis of Rabbit: Toward a Secret Key Leakage
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Fault analysis of grain-128 by targeting NFSR
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Fault analysis on stream cipher MUGI
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Designs, Codes and Cryptography
Fault analysis of the KATAN family of block ciphers
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
A fault attack on the LED block cipher
COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
Differential fault analysis of full LBlock
COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
A differential fault attack on the grain family of stream ciphers
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Hard fault analysis of Trivium
Information Sciences: an International Journal
Fault analysis study of the block cipher FOX64
Multimedia Tools and Applications
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
A differential fault attack on MICKEY 2.0
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.00 |
Trivium is a hardware-oriented stream cipher designed in 2005 by de Cannière and Preneel for the European project eStream, and it has successfully passed the first and the second phase of this project. Its design has a simple and elegant structure. Although Trivium has attached a lot of interest, it remains unbroken.In this paper we present differential fault analysis of Trivium and propose two attacks on Trivium using fault injection. We suppose that an attacker can corrupt exactly one random bit of the inner state and that he can do this many times for the same inner state. This can be achieved e.g. in the CCA scenario. During experimental simulations, having inserted 43 faults at random positions, we were able to disclose the trivium inner state and afterwards the private key.As far as we know, this is the first time differential fault analysis is applied to a stream cipher based on shift register with non-linear feedback.