343
Views
2
CrossRef citations to date
0
Altmetric
Mathematics of Cryptography and Coding in the Quantum Era

A fault attack on KCipher-2

&
Pages 291-312 | Received 23 Jul 2020, Accepted 11 Nov 2020, Published online: 10 Dec 2020

References

  • J. Abbott, A.M. Bigatti, L. Robbiano, CoCoA: a system for doing computations in commutative algebra. Available at http://cocoa.dima.unige.it
  • H. Ahmadi and T. Eghlidos, Heuristic guess-and-determine attacks on stream ciphers, IET Inf. Secur.3 (2009), pp. 66–73.
  • F. Armknecht and W. Meier, Fault attacks on combiners with memory, in Selected Areas in Cryptography (SAC 2005), B. Preneel and S. Tavares, eds., LNCS 3897, Berlin, Heidelberg, Springer-Verlag, 2006, pp. 36–50.
  • S. Babbage, C. De Cannière, A. Canteaut, C. Cid, H. Gilbert, T. Johannson, M. Parker, B. Preneel, V. Rijmen, and M. Robshaw, The eSTREAM portfolio (rev. 1), preprint (2008). Available at http://www.ecrypt.eu.org/stream/portfolio_revision1.pdf
  • A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, Fault injection attacks on cryptodevices: theory, practice and countermeasures, Proc. IEEE 100 (2012), pp. 3056–3076.
  • A. Biere, K. Fazekas, M. Fleury, and M. Heisinger, CaDiCaL, Kissat, Paracooba, Plingeling and Treengeling entering the SAT Competition 2020, in SAT Competition 2020 – Solver and Benchmark Descriptions, 2020, pp. 50–53.
  • A. Bogdanov, B. Preneel, and R. Vincent, Security evaluation of the K2 stream cipher, ver. 1.1, preprint (2011). Available at https://www.cryptrec.go.jp/en/ex_reports.html
  • J. Breier, X. Hou, and S. Bhasin, Automated Methods in Cryptographic Fault Analysis, Springer Int. Publishing, Cham, 2019.
  • M. Brickenstein and A. Dreyer, PolyBoRi: A framework for Gröbner-basis computations with Boolean polynomials, J. Symb. Comput. 44 (2009), pp. 1326–1345.
  • N.T. Courtois and B. Debraize, Algebraic description and simultaneous linear approximations of addition in Snow 2.0, in Information and Communications Security (ICICS 2008), L. Chen, M.D. Ryan, and G. Wang, eds., LNCS 5308, Springer-Verlag, Berlin, Heidelberg, 2008, pp. 328–344.
  • J. Daemen and V. Rijmen, The Design of Rijndael, Springer-Verlag, Berlin, Heidelberg, 1999.
  • B. Debraize and I.M. Corbella, Fault analysis of the stream cipher Snow 3G, in Fault Diagnosis and Tolerance in Cryptography (FDTC 2009), IEEE, Piscataway, 2009, pp. 103–110.
  • W.F. Dowling and J.H. Gallier, Linear-time algorithms for testing the satisfiability of propositional Horn formulae, J. Log. Program. 1 (1984), pp. 267–284.
  • P. Ekdahl and T. Johansson, A new version of the stream cipher SNOW, in Selected Areas in Cryptography (SAC 2002), K. Nyberg and H. Heys, eds., LNCS 2595, Springer-Verlag, Berlin, Heidelberg, 2003, pp. 47–61.
  • M. Henricksen, W.S. Yap, C.H. Yian, S. Kiyomoto, and T. Tanaka, Side-channel analysis of the K2 stream cipher, in Information Security and Privacy (ACISP 2010), R. Steinfeld and P. Hawkes, eds., LNCS 6168, Springer-Verlag, Berlin, Heidelberg, 2010, pp. 53–73.
  • J.J. Hoch and A. Shamir, Fault analysis of stream ciphers, in Cryptographic Hardware and Embedded Systems (CHES 2004), M. Joye and J.J. Quisquater, eds., LNCS 3156, Springer-Verlag, Berlin, Heidelberg, 2004, pp. 240–253.
  • International Organization for Standardization, ISO/IEC 18033-4:2011, preprint (2017). Available at http://www.iso.org/standard/54532.html
  • P. Jovanovic and M. Kreuzer, Algebraic attacks using SAT-solvers, Groups – Complexity – Cryptology2 (2010), pp. 247–259.
  • M. Joye and M. Tunstall, Fault Analysis in Cryptography, Springer-Verlag, Berlin, Heidelberg, 2012.
  • W. Kawai, R. Ueno, N. Homma, T. Aoki, K. Fukushima, and S. Kiyomoto, Practical power analysis on KCipher-2 software on low-end microcontrollers, in IEEE European Symposium on Security and Privacy (EuroS&P 2017), Los Alamitos, IEEE Computer Society, 2017, pp. 113–121.
  • KDDI Corporation, Stream cipher KCipher-2 (ver. 1.2), preprint (2017). Available at http://www.cryptrec.go.jp/en/method.html
  • S. Kiyomoto, T. Tanaka, and K. Sakurai, K2: A stream cipher algorithm using dynamic feedback control, in Security and Cryptography (SECRYPT 2007), J. Hernando, E. Fernández-Medina, and M. Malek, eds., INSTICC Press, Setubal, 2007, pp. 204–213.
  • S. Kiyomoto, T. Tanaka, and K. Sakurai, K2 stream cipher, in E-business and Telecommunications, J. Filipe and M.S. Obaidat, eds., Springer-Verlag, Berlin, Heidelberg, 2009, pp. 214–226.
  • M. Kreuzer and L. Robbiano, Computational Commutative Algebra 1, Springer-Verlag, Berlin, Heidelberg, 2000.
  • M. Kreuzer and L. Robbiano, Computational Commutative Algebra 2, Springer-Verlag, Berlin, Heidelberg, 2008.
  • A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, 1996.
  • U. Oztok and A. Darwiche, A top-down compiler for sentential decision diagrams, in International Conference on Artificial Intelligence (IJCAI'15), Q. Yang and M. Wooldridge, eds., AAAI Press, Palo Alto, 2015, pp. 3141–3148.
  • B. Roy, Evaluation of the word-oriented stream cipher: K2, preprint (2009). Available at https://pdfs.semanticscholar.org
  • M. Soos, K. Nohl, and C. Castelluccia, Extending SAT solvers to cryptographic problems, in Theory and Applications of Satisfiability Testing (SAT 2009), O. Kullmann, ed., LNCS 5584, Springer-Verlag, Berlin, Heidelberg, 2009, pp. 244–257.
  • The Sage Developers, SageMath, the Sage Mathematics Software System (Version 9.1), preprint (2020). Available at https://www.sagemath.org
  • M. Thurley, sharpSAT – Counting models with advanced component caching and implicit BCP, in Theory and Applications of Satisfiability Testing (SAT 2006), A. Biere and C.P. Gomes, eds., LNCS 4121, Springer-Verlag, Berlin, Heidelberg, 2006, pp. 424–429.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.