Paper 2022/387

Phase-shift Fault Analysis of Grain-128

HRIDYA P R, National Institute of Technology Calicut
Jimmy Jose, National Institute of Technology Calicut
Abstract

Phase-shift fault attack is a type of fault attack used for cryptanalysis of stream ciphers. It involves clocking a cipher’s feedback shift registers out of phase, in order to generate faulted keystream. Grain- 128 cipher is a 128-bit modification of the Grain cipher which is one of the finalists in the eSTREAM project. In this work, we propose a phase-shift fault attack against Grain-128 loaded with key-IV pairs that result in an all-zero LFSR after initialisation. We frame equations in terms of the input and output bits of the cipher and solve them using a SAT solver. By correctly guessing 40 internal state bits, we are able to recover the entire 128-bit key with just 2 phase-shift faults for keystreams of length 200 bits.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint.
Keywords
Grain-128Stream ciphersFault analysisHardwareCryptanalysisBoolean functions
Contact author(s)
hridya01 @ gmail com
jimmy @ nitc ac in
History
2024-02-25: revised
2022-03-28: received
See all versions
Short URL
https://ia.cr/2022/387
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/387,
      author = {HRIDYA P R and Jimmy Jose},
      title = {Phase-shift Fault Analysis of Grain-128},
      howpublished = {Cryptology ePrint Archive, Paper 2022/387},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/387}},
      url = {https://eprint.iacr.org/2022/387}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.