跳到主要导航 跳到搜索 跳到主要内容

Practical Differential Fault Attacks on the GPRS Standard Ciphers

  • Zhengting Li
  • , Lin Ding*
  • , An Wang
  • , Haotong Xu
  • , Zheng Liu
  • , Zheng Wu
  • , Xinhai Wang
  • , Jiang Wan
  • *此作品的通讯作者

科研成果: 期刊稿件文章同行评审

摘要

GEA-1 and GEA-2 are two standard stream ciphers used in GPRS (General Packet Radio Service) to protect against eavesdropping GPRS between the base station and the phone. Now, a range of current phones still support them. In this paper, a differential fault attack on the GEA-like stream ciphers under the random fault model is proposed for the first time. In this attack, an efficient dedicated algorithm for identifying the exact fault location is proposed. By using this dedicated algorithm, the attacker can succeed in determining the exact fault location. As applications, practical differential fault attacks on the GPRS standard ciphers (i.e., GEA-1 and GEA-2) are presented, which recover the 64-bit secret keys of GEA-1 and GEA-2 with time complexities of 233.807 and 233.858, respectively. We validate the cryptanalytic results by simulating the whole attacks on the platform ChipWhisperer Lite. The experimental results show that both GEA-1 and GEA-2 can be broken within sixteen minutes on a common laptop. Finally, the possible countermeasures are presented to protect the processed data of massive GPRS devices.

源语言英语
期刊IEEE Transactions on Dependable and Secure Computing
DOI
出版状态已接受/待刊 - 2026
已对外发布

指纹

探究 'Practical Differential Fault Attacks on the GPRS Standard Ciphers' 的科研主题。它们共同构成独一无二的指纹。

引用此