Phase-shift fault analysis of Trivium (Q2820754)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Phase-shift fault analysis of Trivium |
scientific article; zbMATH DE number 6626079
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Phase-shift fault analysis of Trivium |
scientific article; zbMATH DE number 6626079 |
Statements
Phase-shift fault analysis of Trivium (English)
0 references
9 September 2016
0 references
fault analysis
0 references
phase shift
0 references
stream cipher
0 references
Trivium
0 references
algebraic cryptanalysis
0 references
0 references
0 references
0 references
0.81529623
0 references
0.80704075
0 references
0 references
0 references
The authors improve previously known results on fault analysis of the stream cipher Trivium. It is shown (computational experiments on low-end PC) that the phase shift of two registers of the cipher can lead to an attack that requires only 120 bits of keystream per each generated sequence to successfully find the inner state of the cipher which can then be used to find the secret key.
0 references