2015
DOI: 10.1109/tc.2014.2339854
|View full text |Cite
|
Sign up to set email alerts
|

Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions

Abstract: Abstract. The series of published works, related to Differential Fault Attack (DFA) against the Grain family, require (i) quite a large number (hundreds) of faults (around n ln n, where n = 80 for Grain v1 and n = 128 for Grain-128, Grain-128a) and also (ii) several assumptions on location and timing of the fault injected. In this paper we present a significantly improved scenario from the adversarial point of view for DFA against the Grain family of stream ciphers. Our model is the most realistic one so far a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(49 citation statements)
references
References 29 publications
0
49
0
Order By: Relevance
“…The basic idea of AFA is to convert both the cipher and the injected faults into algebraic equations and recover the secret key with automated solvers such as SAT instead of the manual analysis on fault propagations in DFA, hence making it easier to extend AFA to deep rounds and different ciphers and fault models. AFA has been successfully used to improve DFA on the stream ciphers such as Trivium [19] and Grain [20] and block ciphers such as AES [21], LED [22,23], KASUMI [24], and Piccolo [25].…”
Section: Security and Communication Networkmentioning
confidence: 99%
See 3 more Smart Citations
“…The basic idea of AFA is to convert both the cipher and the injected faults into algebraic equations and recover the secret key with automated solvers such as SAT instead of the manual analysis on fault propagations in DFA, hence making it easier to extend AFA to deep rounds and different ciphers and fault models. AFA has been successfully used to improve DFA on the stream ciphers such as Trivium [19] and Grain [20] and block ciphers such as AES [21], LED [22,23], KASUMI [24], and Piccolo [25].…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…We notice that this issue was already explored from a theoretical point of view in [41]. And a worst case lower bound on the number of queries ( , ) to solve (16) is a constant 3, and the corresponding number of queries (0, ) to solve (20) in the worst case is (8 − ), where t is the position of the least significant "1" of and 0 ≤ ≤ 7.…”
Section: Data Complexity Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…In (Banik et al, 2013) the authors present a related-key key attack requiring > 2 32 related keys, and > 2 64 chosen IVs, while in (Sarkar et al, 2015) the authors present a differential fault attack against all the three ciphers in the Grain-family.…”
Section: Related Workmentioning
confidence: 99%