Abstract
This paper proposes differential fault analysis, which is a well-known type of fault analysis, on a stream cipher MUGI, which uses two kinds of update functions of an intermediate state. MUGI was proposed by Hitachi, Ltd. in 2002 and it is specified as ISO/IEC 18033-4 for keystream generation. Fault analysis is a side-channel attack that uses the faulty output obtained by inducing faults into secure devices. To the best knowledge of the authors, this is the first paper that proposes applying fault analysis to MUGI. The proposed attack uses the relation between two kinds of the update functions that are mutually dependent. As a result, our attack can recover a 128-bit secret key using 12.54 pairs of correct and faulty outputs on average within 1 sec.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems, Technion - Computer Science Department - Technical Report CS0901.revised (1997)
Blömer, J., Seifert, J.-P.: Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 162–181. Springer, Heidelberg (2003)
Dusart, P., Letourneux, G., Vivolo, O.: Differential Fault Analysis on A.E.S., Cryptology eprint Archive Report 2003/010 (2003), http://www.iacr.org/
Piret, G., Quisquater, J.J.: A Differential Fault Attack Technique Against SPN Structures, with Application to the AES and Khazad. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003)
Chen, C.-N., Yen, S.-M.: Differential Fault Analysis on AES Key Schedule and Some Countermeasures. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 118–129. Springer, Heidelberg (2003)
Chen, H., Wu, W., Feng, D.: Differential Fault Analysis on CLEFIA. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 284–295. Springer, Heidelberg (2007)
Takahashi, J., Fukunaga, T.: Improved Differential Fault Analysis on CLEFIA. In: FDTC 2008, pp. 25–39. IEEE-CS, Los Alamitos (2008)
Takahashi, J., Fukunaga, T.: Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E93-A(1), 136–143 (2010)
Biham, E., Granboulan, L., Nguyen, P.Q.: Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 359–367. Springer, Heidelberg (2005)
Hoch, J.J., Shamir, A.: Fault Analysis of Stream Ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 240–253. Springer, Heidelberg (2004)
Debraize, B., Corbella, I.M.: Fault Analysis of the Stream Cipher Snow 3G. In: FDTC 2009, pp. 103–110. IEEE-CS, Los Alamitos (2009)
Hojsik, M., Rudolf, B.: Differential Fault Analysis of Trivium. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 158–172. Springer, Heidelberg (2008)
Berzati, A., Canovas, C., Castagnos, G., Debraize, B., Goubin, L., Gouget, A., Paillier, P., Salgado, S.: Fault Analysis of GRAIN-128. In: Proc. of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 7–14. IEEE-CS, Los Alamitos (2009)
Kircanski, A., Youssef, A.M.: Differential Fault Analysis of Rabbit. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 197–214. Springer, Heidelberg (2009)
Berzati, A., Canovas-Dumas, C., Goubin, L.: Fault Analysis of Rabbit: Toward a Secret Key Leakage. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 72–87. Springer, Heidelberg (2009)
Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K., Preneel, B.: A New Keystream Generator MUGI. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 179–194. Springer, Heidelberg (2002)
MUGI Pseudorandom Number Generator Specification Ver. 1.2, Hitachi, Ltd. (2001), This document is available at, http://www.sdl.hitachi.co.jp/crypto/mugi/index-e.html
Daemen, J., Clapp, C.: Fast Hashing and Stream Encryption with PANAMA. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 60–74. Springer, Heidelberg (1998)
MUGI Pseudorandom Number Generator Self-Evaluation Report Ver. 1.1, Hitachi, Ltd. (2001), This document is available at http://www.sdl.hitachi.co.jp/crypto/mugi/index-e.html
Dawson, E., Carter, G., Gustafson, H., Henricksen, M., Millan, W., Simpson, L.: Evaluation of the MUGI Psuedo-Random Number Generator, Technical report, CRYPTREC, Information Technology Promotion Agency (IPA), Tokyo Japan (2002)
Henricksen, M., Dawson, E.: Rekeying Issues in the MUGI Stream Cipher. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 175–188. Springer, Heidelberg (2006)
Hoch, Y.: Fault Analysis of Stream Ciphers M.Sc. Thesis, Weizmann Institute of Science, Israel
Golić, J.D.: A Weakness of the Linear Part of Stream Cipher MUGI. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 178–192. Springer, Heidelberg (2004)
Biryukov, A., Shamir, A.: Analysis of the Non-linear Part of MUGI. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 320–329. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Takahashi, J., Fukunaga, T., Sakiyama, K. (2011). Fault Analysis on Stream Cipher MUGI. In: Rhee, KH., Nyang, D. (eds) Information Security and Cryptology - ICISC 2010. ICISC 2010. Lecture Notes in Computer Science, vol 6829. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24209-0_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-24209-0_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24208-3
Online ISBN: 978-3-642-24209-0
eBook Packages: Computer ScienceComputer Science (R0)