Paper 2014/261

Fault Analysis of Grain Family of Stream Ciphers

Sandip Karmakar and Dipanwita Roy Chowdhury

Abstract

In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The earlier fault attacks on Grain work on LFSR whereas our target for fault induction is the NFSR. Our attack requires a small number of faults to be injected; 150 only for Grain v1 and only 312 and 384 for Grain-128 and Grain-128a, respectively. The number of faults are much lesser than the earlier reported fault attacks; 1587 for Grain-128 and 1831 for Grain-128a.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Fault AttackGrain-128Grain v1Grain-128a
Contact author(s)
sandip1kk @ gmail com
History
2014-04-20: received
Short URL
https://ia.cr/2014/261
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/261,
      author = {Sandip Karmakar and Dipanwita Roy Chowdhury},
      title = {Fault Analysis of Grain Family of Stream Ciphers},
      howpublished = {Cryptology ePrint Archive, Paper 2014/261},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/261}},
      url = {https://eprint.iacr.org/2014/261}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.