2006
DOI: 10.1007/11799313_2
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Grain

Abstract: Abstract. Grain [11] is a lightweight stream cipher proposed by M. Hell, T. Johansson, and W. Meier to the eSTREAM call for stream cipher proposals of the European project ECRYPT [5]. Its 160-bit internal state is divided into a LFSR and an NFSR of length 80 bits each. A filtering boolean function is used to derive each keystream bit from the internal state. By combining linear approximations of the feedback function of the NFSR and of the filtering function, it is possible to derive linear approximation equa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
44
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 60 publications
(47 citation statements)
references
References 19 publications
(6 reference statements)
2
44
0
Order By: Relevance
“…Before describing the attack in detail let us state the following symbolic notations that we shall be using henceforth. 4 corresponds to the NFSR location 63. This implies that if two internal states S and S Δ be such that they differ in LFSR locations 3, 25 and NFSR location 63 and in no other location that contributes inputs to the output keystream bit, then the difference of the keystream bit produced by them will be equal to the value in LFSR location 46.…”
Section: Determining the Lfsr Internal Statementioning
confidence: 99%
See 1 more Smart Citation
“…Before describing the attack in detail let us state the following symbolic notations that we shall be using henceforth. 4 corresponds to the NFSR location 63. This implies that if two internal states S and S Δ be such that they differ in LFSR locations 3, 25 and NFSR location 63 and in no other location that contributes inputs to the output keystream bit, then the difference of the keystream bit produced by them will be equal to the value in LFSR location 46.…”
Section: Determining the Lfsr Internal Statementioning
confidence: 99%
“…Similar to [5], we inject faults in the LFSR only, whereas the NFSR has been used for fault injection in [19]. 4. The attacker has full control over the timing of fault injection, i.e., it is possible to inject the fault precisely at any stage of the cipher operation.…”
Section: Introductionmentioning
confidence: 99%
“…In [5] it was shown, that this could have been done efficiently for the initial version of the cipher i.e. Grain v0.…”
Section: Determining the Nfsr Statementioning
confidence: 99%
“…Grain v0. After the attack in [5] was reported, the designers made the necessary changes to Grain v1, Grain-128 and Grain-128a so that for these new ciphers, determining the NFSR state form the knowledge of the LFSR state was no longer straightforward. In order to determine the NFSR bits, we look into the decomposition of the Boolean function h in more detail.…”
Section: Determining the Nfsr Statementioning
confidence: 99%
“…Its two members, Grain v1 and Grain-128, accept 80-bit and 128-bit keys respectively. The original version of the cipher, later referred to as Grain v0, was submitted to the eSTREAM project, but contained a serious flaw, as was demonstrated by several researchers [7,8]. As a response, the initial submission was tweaked and extended to a family of ciphers.…”
Section: Description Of Grainmentioning
confidence: 99%