Cryptology ePrint Archive: Report 2014/261

Fault Analysis of Grain Family of Stream Ciphers

Sandip Karmakar and Dipanwita Roy Chowdhury

Abstract: In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The earlier fault attacks on Grain work on LFSR whereas our target for fault induction is the NFSR. Our attack requires a small number of faults to be injected; 150 only for Grain v1 and only 312 and 384 for Grain-128 and Grain-128a, respectively. The number of faults are much lesser than the earlier reported fault attacks; 1587 for Grain-128 and 1831 for Grain-128a.

Category / Keywords: secret-key cryptography / Fault Attack, Grain-128, Grain v1, Grain-128a

Date: received 14 Apr 2014

Contact author: sandip1kk at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20140420:153411 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]