Paper 2014/262

Differential Fault Analysis of MICKEY Family of Stream Ciphers

Sandip Karmakar and Dipanwita Roy Chowdhury

Abstract

This paper presents differential fault analysis of the MICKEY family of stream ciphers, one of the winners of eStream project. The current attacks are of the best performance among all the attacks against MICKEY ciphers reported till date. The number of faults required with respect to state size is about 1.5 times the state size. We obtain linear equations to determine state bits. The fault model required is reasonable. The fault model is further relaxed without reproducing the faults and allowing multiple bit faults. In this scenario, more faults are required when reproduction is not allowed whereas, it has been shown that the number of faults remains same for multiple bit faults.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
MICKEY-128 2.0MICKEY v1MICKEY 2.0MICKEY-128Side Channel AttackFault Attack
Contact author(s)
sandip1kk @ gmail com
History
2014-04-20: received
Short URL
https://ia.cr/2014/262
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/262,
      author = {Sandip Karmakar and Dipanwita Roy Chowdhury},
      title = {Differential Fault Analysis of MICKEY Family of Stream Ciphers},
      howpublished = {Cryptology ePrint Archive, Paper 2014/262},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/262}},
      url = {https://eprint.iacr.org/2014/262}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.