Cryptology ePrint Archive: Report 2017/855

Fault Attack on ACORN v3

Xiaojuan Zhang and Xiutao Feng and Dongdai Lin

Abstract: Fault attack is one of the most efficient side channel attacks and has attracted much attention in recent public cryptographic literatures. In this work we introduce a fault attack on the authenticated cipher ACORN v3. Our attack is done under the assumption that a fault is injected into an initial state of ACORN v3 randomly, and contains two main steps: fault locating and equation solving. At the first step, we introduce concepts of unique set and non-unique set, where differential strings belonging to unique sets can determine the fault location uniquely. For strings belonging to non-unique sets, we use some strategies to increase the probability of determining the fault location uniquely to almost 1. At the second step, we demonstrate several ways of retrieving equations, and then obtain the initial state by solving equations with the guess-and-determine method. With $n$ fault experiments, we can recover the initial state with time complexity $c \cdot2^{146.5-3.52\cdot n}$, where $c$ is the time complexity of solving linear equations and $26<n<43$. We also apply the attack to ACORN v2, which shows that, comparing with ACORN v2, the tweaked version ACORN v3 is more vulnerable against the fault attack.

Category / Keywords: CAESAR, Authenticated Cipher, Stream Cipher, ACORN, Fault Attack

Date: received 4 Sep 2017

Contact author: zhangxiaojuan at iie ac cn

Available format(s): PDF | BibTeX Citation

Version: 20170909:212047 (All versions of this report)

Short URL: ia.cr/2017/855

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]