Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers

© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these familie...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Beckers, Arthur, Gierlichs, Benedikt, Verbauwhede, Ingrid
Format: Tagungsbericht
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 212
container_issue
container_start_page 196
container_title
container_volume 10728
creator Beckers, Arthur
Gierlichs, Benedikt
Verbauwhede, Ingrid
description © Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these families of stream ciphers. Then we propose two novel fault attacks that can be used against any variant of the ciphers. We base our attacks on two different fault models: the stuck-at fault model and the biased fault model. Each of them is exploited differently by the attacker. If the attacker knows the plaintexts and the ciphertexts both fault models can be successfully exploited. If the ciphers operate on fixed yet unknown plaintexts only the biased fault model can be successfully exploited. We evaluate exemplary attacks using both models in simulation. Their low complexity confirms that they are practical. To the best of our knowledge these are the first fault attacks against ChaCha and Salsa that do not require faults in the control flow (e.g. instruction skip).
format Conference Proceeding
fullrecord <record><control><sourceid>kuleuven</sourceid><recordid>TN_cdi_kuleuven_dspace_123456789_636580</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>123456789_636580</sourcerecordid><originalsourceid>FETCH-kuleuven_dspace_123456789_6365803</originalsourceid><addsrcrecordid>eNqNzEELgjAYxvFBBZn5HXbrEMLm1G1HkaR73cdLTlxNEzejvn0SfQDhgf_lx7NCO8ao5FlCBF2jgDCSxJKnbIsi5-6EECoFJ1IGqKhgsh4XPdiPMw4_G-xbjcsW5mHoa3wB6wBX0Blr9A9c_Kihw6UZWj26Pdo0M9HRvyE6VKdreY4fk9XTS_eqdgPctKIJS7OcC6lylmeCsBAdl0nl354t__0CEFVI4g</addsrcrecordid><sourcetype>Institutional Repository</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers</title><source>Lirias (KU Leuven Association)</source><source>Springer Books</source><creator>Beckers, Arthur ; Gierlichs, Benedikt ; Verbauwhede, Ingrid</creator><contributor>Eisenbarth, T ; Teglia, Y</contributor><creatorcontrib>Beckers, Arthur ; Gierlichs, Benedikt ; Verbauwhede, Ingrid ; Eisenbarth, T ; Teglia, Y</creatorcontrib><description>© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these families of stream ciphers. Then we propose two novel fault attacks that can be used against any variant of the ciphers. We base our attacks on two different fault models: the stuck-at fault model and the biased fault model. Each of them is exploited differently by the attacker. If the attacker knows the plaintexts and the ciphertexts both fault models can be successfully exploited. If the ciphers operate on fixed yet unknown plaintexts only the biased fault model can be successfully exploited. We evaluate exemplary attacks using both models in simulation. Their low complexity confirms that they are practical. To the best of our knowledge these are the first fault attacks against ChaCha and Salsa that do not require faults in the control flow (e.g. instruction skip).</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3319752081</identifier><identifier>ISBN: 9783319752082</identifier><language>eng</language><publisher>Springer Nature</publisher><ispartof>Lecture Notes in Computer Science, 2017, Vol.10728, p.196-212</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,315,776,780,785,786,27839</link.rule.ids></links><search><contributor>Eisenbarth, T</contributor><contributor>Teglia, Y</contributor><creatorcontrib>Beckers, Arthur</creatorcontrib><creatorcontrib>Gierlichs, Benedikt</creatorcontrib><creatorcontrib>Verbauwhede, Ingrid</creatorcontrib><title>Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers</title><title>Lecture Notes in Computer Science</title><description>© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these families of stream ciphers. Then we propose two novel fault attacks that can be used against any variant of the ciphers. We base our attacks on two different fault models: the stuck-at fault model and the biased fault model. Each of them is exploited differently by the attacker. If the attacker knows the plaintexts and the ciphertexts both fault models can be successfully exploited. If the ciphers operate on fixed yet unknown plaintexts only the biased fault model can be successfully exploited. We evaluate exemplary attacks using both models in simulation. Their low complexity confirms that they are practical. To the best of our knowledge these are the first fault attacks against ChaCha and Salsa that do not require faults in the control flow (e.g. instruction skip).</description><issn>0302-9743</issn><isbn>3319752081</isbn><isbn>9783319752082</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2017</creationdate><recordtype>conference_proceeding</recordtype><sourceid>FZOIL</sourceid><recordid>eNqNzEELgjAYxvFBBZn5HXbrEMLm1G1HkaR73cdLTlxNEzejvn0SfQDhgf_lx7NCO8ao5FlCBF2jgDCSxJKnbIsi5-6EECoFJ1IGqKhgsh4XPdiPMw4_G-xbjcsW5mHoa3wB6wBX0Blr9A9c_Kihw6UZWj26Pdo0M9HRvyE6VKdreY4fk9XTS_eqdgPctKIJS7OcC6lylmeCsBAdl0nl354t__0CEFVI4g</recordid><startdate>20171115</startdate><enddate>20171115</enddate><creator>Beckers, Arthur</creator><creator>Gierlichs, Benedikt</creator><creator>Verbauwhede, Ingrid</creator><general>Springer Nature</general><scope>FZOIL</scope></search><sort><creationdate>20171115</creationdate><title>Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers</title><author>Beckers, Arthur ; Gierlichs, Benedikt ; Verbauwhede, Ingrid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-kuleuven_dspace_123456789_6365803</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Beckers, Arthur</creatorcontrib><creatorcontrib>Gierlichs, Benedikt</creatorcontrib><creatorcontrib>Verbauwhede, Ingrid</creatorcontrib><collection>Lirias (KU Leuven Association)</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Beckers, Arthur</au><au>Gierlichs, Benedikt</au><au>Verbauwhede, Ingrid</au><au>Eisenbarth, T</au><au>Teglia, Y</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers</atitle><btitle>Lecture Notes in Computer Science</btitle><date>2017-11-15</date><risdate>2017</risdate><volume>10728</volume><spage>196</spage><epage>212</epage><pages>196-212</pages><issn>0302-9743</issn><isbn>3319752081</isbn><isbn>9783319752082</isbn><abstract>© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these families of stream ciphers. Then we propose two novel fault attacks that can be used against any variant of the ciphers. We base our attacks on two different fault models: the stuck-at fault model and the biased fault model. Each of them is exploited differently by the attacker. If the attacker knows the plaintexts and the ciphertexts both fault models can be successfully exploited. If the ciphers operate on fixed yet unknown plaintexts only the biased fault model can be successfully exploited. We evaluate exemplary attacks using both models in simulation. Their low complexity confirms that they are practical. To the best of our knowledge these are the first fault attacks against ChaCha and Salsa that do not require faults in the control flow (e.g. instruction skip).</abstract><pub>Springer Nature</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture Notes in Computer Science, 2017, Vol.10728, p.196-212
issn 0302-9743
language eng
recordid cdi_kuleuven_dspace_123456789_636580
source Lirias (KU Leuven Association); Springer Books
title Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T14%3A02%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kuleuven&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Fault%20Analysis%20of%20the%20ChaCha%20and%20Salsa%20Families%20of%20Stream%20Ciphers&rft.btitle=Lecture%20Notes%20in%20Computer%20Science&rft.au=Beckers,%20Arthur&rft.date=2017-11-15&rft.volume=10728&rft.spage=196&rft.epage=212&rft.pages=196-212&rft.issn=0302-9743&rft.isbn=3319752081&rft.isbn_list=9783319752082&rft_id=info:doi/&rft_dat=%3Ckuleuven%3E123456789_636580%3C/kuleuven%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true