Sosemanuk is a software-based stream cipher which supports a variable key length of either 128 or 256 bits and 128-bit initial values. It has passed all three stages of the ECRYPT stream cipher project and is a member of the eSTREAM software portfolio. In this paper, we present a fault analysis attack on Sosemanuk. The fault model in which we analyze the cipher is the one in which the attacker is assumed to be able to fault a random inner state word but cannot control the exact location of injected faults. Our attack, which recovers the secret inner state of the cipher, requires around 6144 faults, work equivalent to around 248 Sosemanuk iterations and a storage of around 2 38.17 bytes. © 2011 Springer-Verlag.
CITATION STYLE
Esmaeili Salehani, Y., Kircanski, A., & Youssef, A. (2011). Differential fault analysis of Sosemanuk. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6737 LNCS, pp. 316–331). https://doi.org/10.1007/978-3-642-21969-6_20
Mendeley helps you to discover research relevant for your work.