Phase-shift Fault Analysis of Grain v1

Authors

  • Viliam Hromada Slovak University of Technology
  • Tibor Petho Slovak University of Technology

Abstract

This paper deals with the phase-shift fault analysis
of stream cipher Grain v1. We assume that the attacker is able
to desynchronize the linear and nonlinear registers of the cipher
during the keystream generation phase by either forcing one of
the registers to clock one more time, while the other register is not
clocked, or by preventing one of the registers from clocking, while
the other register is clocked. Using this technique, we are able to
obtain the full inner state of the cipher in reasonable time (under
12 hours on a single PC) by using 150 bits of unfaulted keystream,
600 bits of faulted keystreams and by correctly guessing 28 bits
of the linear register.

References

BANIK, S. - MAITRA, S. - SARKAR, S. A Differential Fault Attack

on the Grain Family of Stream Ciphers. In CHES. 2012. p. 122-139.

BANIK, S. - MAITRA, S. - SARKAR, S. A Differential Fault Attack on

the Grain Family under Reasonable Assumptions. In Indocrypt. 2012.

p. 191-208.

BANIK, S. - MAITRA, S. - SARKAR, S. Differential Fault Attack

against Grain family with very few faults and minimal assumptions. In

IEEE Transactions on Computers, 2015, 64.6: 1647-1657.

GOMUŁKIEWICZ, M., et al. Synchronization Fault Cryptanalysis for

Breaking A5/1. In Experimental and Efficient Algorithms. Springer

Berlin Heidelberg, 2005, p. 415-427.

HELL, M. - JOHANSSON, T. - MEIER, W.. Grain: a stream cipher

for constrained environments. In International Journal of Wireless and

Mobile Computing, 2007, 2.1: 86-93.

HOCH, J. - SHAMIR, A.. Fault analysis of stream ciphers. In: International

Workshop on Cryptographic Hardware and Embedded Systems.

Springer Berlin Heidelberg, 2004. p. 240-253.

HROMADA, V. - VARGA, J. Phase-shift Fault Analysis of Trivium. In

Studia Scientiarum Mathematicarum Hungarica, 2015, 52.2: 205-220.

LOE, C. W. - KHOO, K. Side Channel Attacks on Irregularly Decimated

Generators. In Information Security and Cryptology - ICISC 2007,

Springer Berlin Heidelberg, 2007, p. 116-130.

Downloads

Published

2018-04-27

Issue

Section

Cryptography and Cybersecurity