Differential fault analysis of Sosemanuk

12Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Sosemanuk is a software-based stream cipher which supports a variable key length of either 128 or 256 bits and 128-bit initial values. It has passed all three stages of the ECRYPT stream cipher project and is a member of the eSTREAM software portfolio. In this paper, we present a fault analysis attack on Sosemanuk. The fault model in which we analyze the cipher is the one in which the attacker is assumed to be able to fault a random inner state word but cannot control the exact location of injected faults. Our attack, which recovers the secret inner state of the cipher, requires around 6144 faults, work equivalent to around 248 Sosemanuk iterations and a storage of around 2 38.17 bytes. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Esmaeili Salehani, Y., Kircanski, A., & Youssef, A. (2011). Differential fault analysis of Sosemanuk. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6737 LNCS, pp. 316–331). https://doi.org/10.1007/978-3-642-21969-6_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free