Loading...

Differential distinguishing attack on the shannon stream cipher based on fault analysis

Hassanzadeh, M. M ; Sharif University of Technology | 2008

265 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISTEL.2008.4651385
  3. Publisher: 2008
  4. Abstract:
  5. In reference [1], some weak points in the design of the Shannon stream cipher and a differential distinguisher with complexity of O(214.92) keystream bits (i.e. O(29.92) keystream words) were presented. Another distinguishing attack based on a multidimensional linear transformation was presented in [2] which require 2106.996 keystream words. Both of these attacks need to have access to the initial state that is unlikely. In this paper, a likely attack using fault analysis method is exploited to solve the mentioned problem. Additionally, a new distinguisher is proposed which improves the attack complexity to four times the complexity of running the Shannon stream cipher. Only are two differential outputs needed for successful attack with error probability equal to 0.001. ©2008 IEEE
  6. Keywords:
  7. Attack complexity ; Differential ; Differential fault analysis (DFA) ; Differential output ; Distinguisher ; Distinguishing attack ; Distinguishing attacks ; Error probabilities ; Fault analysis ; Initial state ; Keystream ; Linear transformation ; Shannon stream cipher ; Stream Ciphers ; Weak points ; Probability ; Cryptography
  8. Source: 2008 International Symposium on Telecommunications, IST 2008, Tehran, 27 August 2008 through 28 August 2008 ; 2008 , Pages 671-676 ; 9781424427512 (ISBN)
  9. URL: https://ieeexplore.ieee.org/document/4651385