Although Differential Fault Analysis (DFA) led to powerful applications against public key [15] and secret key [12] cryptosystems, very few works have been published in the area of stream ciphers. In this paper, we present the first application of DFA to the software eSTREAM candidate Rabbit that leads to a full secret key recovery. We show that by modifying modular additions of the next-state function, 32 faulty outputs are enough for recovering the whole internal state in time O(234) and extracting the secret key. Thus, this work improves the previous fault attack against Rabbit both in terms of computational complexity and fault number. © 2009 Springer-Verlag.
CITATION STYLE
Berzati, A., Canovas-Dumas, C., & Goubin, L. (2009). Fault analysis of rabbit: Toward a secret key leakage. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5922 LNCS, pp. 72–87). https://doi.org/10.1007/978-3-642-10628-6_5
Mendeley helps you to discover research relevant for your work.