Using SAT solving to improve differential fault analysis of trivium

18Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Combining different cryptanalytic methods to attack a cryptosystem became one of the hot topics in cryptanalysis. In particular, algebraic methods in side channel and differential fault analysis (DFA) attracted a lot of attention recently. In [9], Hojsík and Rudolf used DFA to recover the inner state of the stream cipher Trivium which leads to recovering the secret key. For this attack, they required 3.2 one-bit fault injections on average and 800 keystream bits. In this paper, we give an example of combining DFA attacks and algebraic attacks. We use algebraic methods to improve the DFA of Trivium [9]. Our improved DFA attack recovers the inner state of Trivium by using only 2 fault injections and only 420 keystream bits. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Mohamed, M. S. E., Bulygin, S., & Buchmann, J. (2011). Using SAT solving to improve differential fault analysis of trivium. In Communications in Computer and Information Science (Vol. 200 CCIS, pp. 62–71). https://doi.org/10.1007/978-3-642-23141-4_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free