Findings Annihilator(s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128

LILI-128 keystream generator was designed by Dawson et al. (2000) and it was submitted to NESSIE project. This LILI-128 algorithm is a LFSR based synchronous stream cipher come with 128 bit key length. LILI-128 was designed to implement in hardware and software based and its offer large period and l...

Full description

Saved in:
Bibliographic Details
Main Authors: Omar @ Othman, Wan Zariman, Mohd Jawi, Suhairi, Kamel Ariffin, Muhammad Rezal, Mahad, Zahari, Shamsuddin, Solahuddin
Format: Article
Language:English
Published: Engineering and Technology Publishing 2020
Online Access:http://psasir.upm.edu.my/id/eprint/89021/1/CIP.pdf
http://psasir.upm.edu.my/id/eprint/89021/
http://www.jait.us/index.php?m=content&c=index&a=show&catid=203&id=1126
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Putra Malaysia
Language: English
Description
Summary:LILI-128 keystream generator was designed by Dawson et al. (2000) and it was submitted to NESSIE project. This LILI-128 algorithm is a LFSR based synchronous stream cipher come with 128 bit key length. LILI-128 was designed to implement in hardware and software based and its offer large period and linear complexity. In this algorithm, the Boolean function given with coefficients, n is equal to ten (10) and its degree, d is equal to six (6). In conducting this attack, we aim to decrease the degree of the targeted Boolean equation by find it vulnerability with constructing low degree annihilator equation(s). We adopt the Fault Injection Analysis (FIA) methodology to achieve our objectives. In this study, we found the vulnerability via annihilator(s) through FIA (inject with value of one (1)) on Boolean function of LILI-128. With these injected Boolean functions, we proceed to utilize Hao’s method to find new annihilator(s). Then we obtained new annihilator(s) on Boolean function of LILI-128 stream cipher. As a result, these newly identified annihilators successfully reduce the complexity of the published Boolean function to guess the initial secret key. It likewise gives truly necessary data on the security of these chose stream cipher concerning Fault Injection Analysis.