2005
DOI: 10.1007/11502760_24
|View full text |Cite
|
Sign up to set email alerts
|

Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4

Abstract: Abstract. In this paper we introduce the notion of impossible fault analysis, and present an impossible fault analysis of RC4, whose complexity 2 21 is smaller than the previously best known attack of Hoch and Shamir (2 26 ), along with an even faster fault analysis of RC4, based on different ideas, with complexity smaller than 2 16 .

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
34
0
1

Year Published

2005
2005
2012
2012

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(37 citation statements)
references
References 13 publications
1
34
0
1
Order By: Relevance
“…However, these undesirable structural properties might be useful to mount an impossible fault attack for the stream cipher. Particularly, what we have called A-states could play a role analogous to Finney states for RC4, in way similar to that presented by Biham et al at FSE'05 [5]. We consider this as an interesting direction for future research.…”
Section: Discussionsupporting
confidence: 57%
“…However, these undesirable structural properties might be useful to mount an impossible fault attack for the stream cipher. Particularly, what we have called A-states could play a role analogous to Finney states for RC4, in way similar to that presented by Biham et al at FSE'05 [5]. We consider this as an interesting direction for future research.…”
Section: Discussionsupporting
confidence: 57%
“…This fact is illustrated by the Figure 4. In this section, two principles are associated, the first one impossible differential, which is first published in [21,22], and the second one fault analysis, like [2,26]. Our impossible differential fault analysis corresponds to 5-round impossible differential cryptanalysis attack, which is described in [3].…”
Section: Impossible Differential Fault Attack On Aes-128mentioning
confidence: 99%
“…C (1) is the faulty ciphertext obtained where fault 1 is injected, similarly,C (2) the faulty ciphertext links to fault 2 . We have the two following facts :…”
Section: Property Of Recombinationmentioning
confidence: 99%
“…It was first proposed by E. Biham and A. Shamir on DES 2 in 1997. The similar attacks have been applied to AES [3][4][5][6][7][8] , Triple-DES 9 , RC4 10 , Camellia 11 , ARIA 12 , SMS4 [13][14] , PRESENT 15 and so on. The DFA exploits easily accessible information like input-output behavior under malfunctions, amplifies and evaluates the leaked information with the help of mathematical methods.…”
Section: Introductionmentioning
confidence: 99%