Facebook Instagram Twitter RSS Feed PodBean Back to top on side

Fault cryptanalysis for breaking A5/1

In: Tatra Mountains Mathematical Publications, vol. 33, no. 1
Marcin Gomułkiewicz - Mirosław Kutyłowski - Paweł Wlaź
Detaily:
Rok, strany: 2006, 169 - 177
O článku:
We present a fault attack on the A5/1 stream cipher. It is performed by imposing error bits on shift registers. The attack works very efficiently: it needs only a small amount of generated bits and does not require the correct sequence for our comparison (which differentiates our attack from the other known fault attacks.) In this way we demonstrate a weakness of ciphers based on LFSR's and clocking scheme, such as used in A5/1, implemented in hardware. This is a serious warning showing that a hardware implementation of such a simple scheme as A5/1 does not necessarily improve security—even if the algorithm looks very well suited for a hardware implementation.
Ako citovať:
ISO 690:
Gomułkiewicz, M., Kutyłowski, M., Wlaź, P. 2006. Fault cryptanalysis for breaking A5/1. In Tatra Mountains Mathematical Publications, vol. 33, no.1, pp. 169-177. 1210-3195.

APA:
Gomułkiewicz, M., Kutyłowski, M., Wlaź, P. (2006). Fault cryptanalysis for breaking A5/1. Tatra Mountains Mathematical Publications, 33(1), 169-177. 1210-3195.