{"title":"SNOW 5G流密码异或版本的差分故障攻击","authors":"Wenhao Liu, Chenhui Jin","doi":"10.1016/j.jisa.2025.104108","DOIUrl":null,"url":null,"abstract":"<div><div>This paper presents a differential fault attack (DFA) on the XOR version of SNOW 5G, in which modular <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>16</mn></mrow></msup></math></span> addition is replaced by bitwise XOR. Using single-byte faults in the Finite State Machine (FSM) during the keystream generation phase, we demonstrate a complete recovery of the 896-bit internal state and 256-bit secret key. By injecting a single-byte fault into registers R1 and R2 of FSM during the keystream generation phase, we solve linear equations derived from keystream differences, obtaining an average of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>1</mn><mo>.</mo><mn>01</mn></mrow></msup></math></span> candidate values for 25 bytes and 14 bytes of the internal state, respectively. Furthermore, we present a fault timing and location determination method based on keystream differential patterns, determining the internal state at one time from the multi-time state of R1 and R2. By leveraging 4 collision attacks, the attack complexity is reduced to a time complexity of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>19</mn><mo>.</mo><mn>115</mn></mrow></msup></math></span> and a storage complexity of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>12</mn><mo>.</mo><mn>697</mn></mrow></msup></math></span> (using 16 faults). For key recovery, we formulate the problem as recovering R2 at 14th and 15th time during the initialization phase, and propose a subspace trail-based fault localization technique. This technique uniquely identifies the location of single-byte FSM faults by analyzing keystream differential deviations, even when distinct fault positions induce identical differential patterns. Finally, we derive the differential propagation patterns induced by single-byte faults in R2 at 14th/15th time and R1 at 13th/14th time during initialization phase, and propose two key recovery schemes. When fault location is unknown, using 80 faults yields an average of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>25</mn><mo>.</mo><mn>877</mn></mrow></msup></math></span> candidate keys. When fault location is controllable, using 8 faults yields an average of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>8</mn></mrow></msup></math></span> candidate keys, with a storage complexity of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>4</mn><mo>.</mo><mn>01</mn></mrow></msup></math></span> and time complexity of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>17</mn><mo>.</mo><mn>16</mn></mrow></msup></math></span>.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104108"},"PeriodicalIF":3.8000,"publicationDate":"2025-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Differential fault attack on the XOR version of SNOW 5G stream cipher\",\"authors\":\"Wenhao Liu, Chenhui Jin\",\"doi\":\"10.1016/j.jisa.2025.104108\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>This paper presents a differential fault attack (DFA) on the XOR version of SNOW 5G, in which modular <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>16</mn></mrow></msup></math></span> addition is replaced by bitwise XOR. Using single-byte faults in the Finite State Machine (FSM) during the keystream generation phase, we demonstrate a complete recovery of the 896-bit internal state and 256-bit secret key. By injecting a single-byte fault into registers R1 and R2 of FSM during the keystream generation phase, we solve linear equations derived from keystream differences, obtaining an average of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>1</mn><mo>.</mo><mn>01</mn></mrow></msup></math></span> candidate values for 25 bytes and 14 bytes of the internal state, respectively. Furthermore, we present a fault timing and location determination method based on keystream differential patterns, determining the internal state at one time from the multi-time state of R1 and R2. By leveraging 4 collision attacks, the attack complexity is reduced to a time complexity of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>19</mn><mo>.</mo><mn>115</mn></mrow></msup></math></span> and a storage complexity of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>12</mn><mo>.</mo><mn>697</mn></mrow></msup></math></span> (using 16 faults). For key recovery, we formulate the problem as recovering R2 at 14th and 15th time during the initialization phase, and propose a subspace trail-based fault localization technique. This technique uniquely identifies the location of single-byte FSM faults by analyzing keystream differential deviations, even when distinct fault positions induce identical differential patterns. Finally, we derive the differential propagation patterns induced by single-byte faults in R2 at 14th/15th time and R1 at 13th/14th time during initialization phase, and propose two key recovery schemes. When fault location is unknown, using 80 faults yields an average of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>25</mn><mo>.</mo><mn>877</mn></mrow></msup></math></span> candidate keys. When fault location is controllable, using 8 faults yields an average of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>8</mn></mrow></msup></math></span> candidate keys, with a storage complexity of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>4</mn><mo>.</mo><mn>01</mn></mrow></msup></math></span> and time complexity of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>17</mn><mo>.</mo><mn>16</mn></mrow></msup></math></span>.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"93 \",\"pages\":\"Article 104108\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2025-06-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625001450\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001450","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Differential fault attack on the XOR version of SNOW 5G stream cipher
This paper presents a differential fault attack (DFA) on the XOR version of SNOW 5G, in which modular addition is replaced by bitwise XOR. Using single-byte faults in the Finite State Machine (FSM) during the keystream generation phase, we demonstrate a complete recovery of the 896-bit internal state and 256-bit secret key. By injecting a single-byte fault into registers R1 and R2 of FSM during the keystream generation phase, we solve linear equations derived from keystream differences, obtaining an average of candidate values for 25 bytes and 14 bytes of the internal state, respectively. Furthermore, we present a fault timing and location determination method based on keystream differential patterns, determining the internal state at one time from the multi-time state of R1 and R2. By leveraging 4 collision attacks, the attack complexity is reduced to a time complexity of and a storage complexity of (using 16 faults). For key recovery, we formulate the problem as recovering R2 at 14th and 15th time during the initialization phase, and propose a subspace trail-based fault localization technique. This technique uniquely identifies the location of single-byte FSM faults by analyzing keystream differential deviations, even when distinct fault positions induce identical differential patterns. Finally, we derive the differential propagation patterns induced by single-byte faults in R2 at 14th/15th time and R1 at 13th/14th time during initialization phase, and propose two key recovery schemes. When fault location is unknown, using 80 faults yields an average of candidate keys. When fault location is controllable, using 8 faults yields an average of candidate keys, with a storage complexity of and time complexity of .
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.