Paper 2022/387

Phase-shift Fault Analysis of Grain-128

Hridya P R and Jimmy Jose

Abstract

Phase-shift fault attack is a type of fault attack used for cryptanalysis of stream ciphers. It involves clocking a cipher’s feedback shift registers out of phase, in order to generate faulted keystream. Grain-128 cipher is a 128-bit modification of the Grain cipher which is one of the finalists in the eSTREAM project. In this work, we propose a phase-shift fault attack against Grain-128 loaded with key-IV pairs that result in an all-zero LFSR after initialisation. We frame equations in terms of the input and output bits of the cipher and solve them using a SAT solver. By correctly guessing 40 innerstate bits, we are able to recover the entire 128-bit key with just 2 phase-shift faults for keystreams of length 200 bits.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Grain-128Stream ciphersFault analysisHardwareCryptanalysisBoolean functions
Contact author(s)
hridya01 @ gmail com
hridya_p170025cs @ nitc ac in
History
2022-03-28: received
Short URL
https://ia.cr/2022/387
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/387,
      author = {Hridya P R and Jimmy Jose},
      title = {Phase-shift Fault Analysis of Grain-128},
      howpublished = {Cryptology ePrint Archive, Paper 2022/387},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/387}},
      url = {https://eprint.iacr.org/2022/387}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.