Cryptology ePrint Archive: Report 2014/261
Fault Analysis of Grain Family of Stream Ciphers
Sandip Karmakar and Dipanwita Roy Chowdhury
Abstract: In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The earlier fault attacks on Grain work on LFSR whereas our target for fault induction is the NFSR. Our attack requires a small number of faults to be injected; 150 only for Grain v1 and only 312 and 384 for Grain-128 and Grain-128a, respectively. The number of faults are much lesser than the earlier reported fault attacks; 1587 for Grain-128 and 1831 for Grain-128a.
Category / Keywords: secret-key cryptography / Fault Attack, Grain-128, Grain v1, Grain-128a
Date: received 14 Apr 2014
Contact author: sandip1kk at gmail com
Available format(s): PDF | BibTeX Citation
Version: 20140420:153411 (All versions of this report)
Short URL: ia.cr/2014/261
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]