Phase-shift fault analysis of Trivium (Q2820754)

From MaRDI portal
!
WARNING

This is the item page for this Wikibase entity, intended for internal use and editing purposes.

Please use the normal view instead:

scientific article; zbMATH DE number 6626079
Language Label Description Also known as
default for all languages
No label defined
    English
    Phase-shift fault analysis of Trivium
    scientific article; zbMATH DE number 6626079

      Statements

      Phase-shift fault analysis of Trivium (English)
      0 references
      0 references
      0 references
      9 September 2016
      0 references
      fault analysis
      0 references
      phase shift
      0 references
      stream cipher
      0 references
      Trivium
      0 references
      algebraic cryptanalysis
      0 references
      The authors improve previously known results on fault analysis of the stream cipher Trivium. It is shown (computational experiments on low-end PC) that the phase shift of two registers of the cipher can lead to an attack that requires only 120 bits of keystream per each generated sequence to successfully find the inner state of the cipher which can then be used to find the secret key.
      0 references
      0 references

      Identifiers