Fault analysis of rabbit: Toward a secret key leakage

11Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Although Differential Fault Analysis (DFA) led to powerful applications against public key [15] and secret key [12] cryptosystems, very few works have been published in the area of stream ciphers. In this paper, we present the first application of DFA to the software eSTREAM candidate Rabbit that leads to a full secret key recovery. We show that by modifying modular additions of the next-state function, 32 faulty outputs are enough for recovering the whole internal state in time O(234) and extracting the secret key. Thus, this work improves the previous fault attack against Rabbit both in terms of computational complexity and fault number. © 2009 Springer-Verlag.

Cite

CITATION STYLE

APA

Berzati, A., Canovas-Dumas, C., & Goubin, L. (2009). Fault analysis of rabbit: Toward a secret key leakage. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5922 LNCS, pp. 72–87). https://doi.org/10.1007/978-3-642-10628-6_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free