Paper 2014/261
Fault Analysis of Grain Family of Stream Ciphers
Sandip Karmakar and Dipanwita Roy Chowdhury
Abstract
In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The earlier fault attacks on Grain work on LFSR whereas our target for fault induction is the NFSR. Our attack requires a small number of faults to be injected; 150 only for Grain v1 and only 312 and 384 for Grain-128 and Grain-128a, respectively. The number of faults are much lesser than the earlier reported fault attacks; 1587 for Grain-128 and 1831 for Grain-128a.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- Fault AttackGrain-128Grain v1Grain-128a
- Contact author(s)
- sandip1kk @ gmail com
- History
- 2014-04-20: received
- Short URL
- https://ia.cr/2014/261
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/261, author = {Sandip Karmakar and Dipanwita Roy Chowdhury}, title = {Fault Analysis of Grain Family of Stream Ciphers}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/261}, year = {2014}, url = {https://eprint.iacr.org/2014/261} }