Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers
© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these familie...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 212 |
---|---|
container_issue | |
container_start_page | 196 |
container_title | |
container_volume | 10728 |
creator | Beckers, Arthur Gierlichs, Benedikt Verbauwhede, Ingrid |
description | © Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these families of stream ciphers. Then we propose two novel fault attacks that can be used against any variant of the ciphers. We base our attacks on two different fault models: the stuck-at fault model and the biased fault model. Each of them is exploited differently by the attacker. If the attacker knows the plaintexts and the ciphertexts both fault models can be successfully exploited. If the ciphers operate on fixed yet unknown plaintexts only the biased fault model can be successfully exploited. We evaluate exemplary attacks using both models in simulation. Their low complexity confirms that they are practical. To the best of our knowledge these are the first fault attacks against ChaCha and Salsa that do not require faults in the control flow (e.g. instruction skip). |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>kuleuven</sourceid><recordid>TN_cdi_kuleuven_dspace_123456789_636580</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>123456789_636580</sourcerecordid><originalsourceid>FETCH-kuleuven_dspace_123456789_6365803</originalsourceid><addsrcrecordid>eNqNzEELgjAYxvFBBZn5HXbrEMLm1G1HkaR73cdLTlxNEzejvn0SfQDhgf_lx7NCO8ao5FlCBF2jgDCSxJKnbIsi5-6EECoFJ1IGqKhgsh4XPdiPMw4_G-xbjcsW5mHoa3wB6wBX0Blr9A9c_Kihw6UZWj26Pdo0M9HRvyE6VKdreY4fk9XTS_eqdgPctKIJS7OcC6lylmeCsBAdl0nl354t__0CEFVI4g</addsrcrecordid><sourcetype>Institutional Repository</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers</title><source>Lirias (KU Leuven Association)</source><source>Springer Books</source><creator>Beckers, Arthur ; Gierlichs, Benedikt ; Verbauwhede, Ingrid</creator><contributor>Eisenbarth, T ; Teglia, Y</contributor><creatorcontrib>Beckers, Arthur ; Gierlichs, Benedikt ; Verbauwhede, Ingrid ; Eisenbarth, T ; Teglia, Y</creatorcontrib><description>© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these families of stream ciphers. Then we propose two novel fault attacks that can be used against any variant of the ciphers. We base our attacks on two different fault models: the stuck-at fault model and the biased fault model. Each of them is exploited differently by the attacker. If the attacker knows the plaintexts and the ciphertexts both fault models can be successfully exploited. If the ciphers operate on fixed yet unknown plaintexts only the biased fault model can be successfully exploited. We evaluate exemplary attacks using both models in simulation. Their low complexity confirms that they are practical. To the best of our knowledge these are the first fault attacks against ChaCha and Salsa that do not require faults in the control flow (e.g. instruction skip).</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3319752081</identifier><identifier>ISBN: 9783319752082</identifier><language>eng</language><publisher>Springer Nature</publisher><ispartof>Lecture Notes in Computer Science, 2017, Vol.10728, p.196-212</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,315,776,780,785,786,27839</link.rule.ids></links><search><contributor>Eisenbarth, T</contributor><contributor>Teglia, Y</contributor><creatorcontrib>Beckers, Arthur</creatorcontrib><creatorcontrib>Gierlichs, Benedikt</creatorcontrib><creatorcontrib>Verbauwhede, Ingrid</creatorcontrib><title>Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers</title><title>Lecture Notes in Computer Science</title><description>© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these families of stream ciphers. Then we propose two novel fault attacks that can be used against any variant of the ciphers. We base our attacks on two different fault models: the stuck-at fault model and the biased fault model. Each of them is exploited differently by the attacker. If the attacker knows the plaintexts and the ciphertexts both fault models can be successfully exploited. If the ciphers operate on fixed yet unknown plaintexts only the biased fault model can be successfully exploited. We evaluate exemplary attacks using both models in simulation. Their low complexity confirms that they are practical. To the best of our knowledge these are the first fault attacks against ChaCha and Salsa that do not require faults in the control flow (e.g. instruction skip).</description><issn>0302-9743</issn><isbn>3319752081</isbn><isbn>9783319752082</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2017</creationdate><recordtype>conference_proceeding</recordtype><sourceid>FZOIL</sourceid><recordid>eNqNzEELgjAYxvFBBZn5HXbrEMLm1G1HkaR73cdLTlxNEzejvn0SfQDhgf_lx7NCO8ao5FlCBF2jgDCSxJKnbIsi5-6EECoFJ1IGqKhgsh4XPdiPMw4_G-xbjcsW5mHoa3wB6wBX0Blr9A9c_Kihw6UZWj26Pdo0M9HRvyE6VKdreY4fk9XTS_eqdgPctKIJS7OcC6lylmeCsBAdl0nl354t__0CEFVI4g</recordid><startdate>20171115</startdate><enddate>20171115</enddate><creator>Beckers, Arthur</creator><creator>Gierlichs, Benedikt</creator><creator>Verbauwhede, Ingrid</creator><general>Springer Nature</general><scope>FZOIL</scope></search><sort><creationdate>20171115</creationdate><title>Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers</title><author>Beckers, Arthur ; Gierlichs, Benedikt ; Verbauwhede, Ingrid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-kuleuven_dspace_123456789_6365803</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Beckers, Arthur</creatorcontrib><creatorcontrib>Gierlichs, Benedikt</creatorcontrib><creatorcontrib>Verbauwhede, Ingrid</creatorcontrib><collection>Lirias (KU Leuven Association)</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Beckers, Arthur</au><au>Gierlichs, Benedikt</au><au>Verbauwhede, Ingrid</au><au>Eisenbarth, T</au><au>Teglia, Y</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers</atitle><btitle>Lecture Notes in Computer Science</btitle><date>2017-11-15</date><risdate>2017</risdate><volume>10728</volume><spage>196</spage><epage>212</epage><pages>196-212</pages><issn>0302-9743</issn><isbn>3319752081</isbn><isbn>9783319752082</isbn><abstract>© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis study of the ChaCha and Salsa families of stream ciphers. We first show that attacks like differential fault analysis that are common in the block cipher setting are not applicable against these families of stream ciphers. Then we propose two novel fault attacks that can be used against any variant of the ciphers. We base our attacks on two different fault models: the stuck-at fault model and the biased fault model. Each of them is exploited differently by the attacker. If the attacker knows the plaintexts and the ciphertexts both fault models can be successfully exploited. If the ciphers operate on fixed yet unknown plaintexts only the biased fault model can be successfully exploited. We evaluate exemplary attacks using both models in simulation. Their low complexity confirms that they are practical. To the best of our knowledge these are the first fault attacks against ChaCha and Salsa that do not require faults in the control flow (e.g. instruction skip).</abstract><pub>Springer Nature</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture Notes in Computer Science, 2017, Vol.10728, p.196-212 |
issn | 0302-9743 |
language | eng |
recordid | cdi_kuleuven_dspace_123456789_636580 |
source | Lirias (KU Leuven Association); Springer Books |
title | Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T14%3A02%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kuleuven&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Fault%20Analysis%20of%20the%20ChaCha%20and%20Salsa%20Families%20of%20Stream%20Ciphers&rft.btitle=Lecture%20Notes%20in%20Computer%20Science&rft.au=Beckers,%20Arthur&rft.date=2017-11-15&rft.volume=10728&rft.spage=196&rft.epage=212&rft.pages=196-212&rft.issn=0302-9743&rft.isbn=3319752081&rft.isbn_list=9783319752082&rft_id=info:doi/&rft_dat=%3Ckuleuven%3E123456789_636580%3C/kuleuven%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |