Differential Fault Attack on Grain v1, ACORN v3 and Lizard

被引:14
|
作者
Siddhanti, Akhilesh [1 ]
Sarkar, Santanu [2 ]
Maitra, Subhamoy [3 ]
Chattopadhyay, Anupam [4 ]
机构
[1] BITS Pilani KK Birla, Goa Campus, Zuarinagar 403726, Goa, India
[2] IIT Madras, Dept Math, Chennai 600036, Tamil Nadu, India
[3] ISI Kolkata, Appl Stat Unit, 203 BT Rd, Kolkata 700108, India
[4] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
来源
SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2017 | 2017年 / 10662卷
关键词
Differential Fault Attack; Stream cipher; Grain v1; ACORN v3; Lizard;
D O I
10.1007/978-3-319-71501-8_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential Fault Attack (DFA) is a very well known technique to evaluate security of a stream cipher. This considers that the stream cipher can be weakened by injection of the fault. In this paper we study DFA on three ciphers, namely Grain v1, Lizard and ACORN v3. We show that Grain v1 (an eStream cipher) can be attacked with injection of only 5 faults instead of 10 that has been reported in 2012. For the first time, we have mounted the fault attack on Lizard, a very recent design and show that one requires only 5 faults to obtain the state. ACORN v3 is a third round candidate of CAESAR and there is only one hard fault attack on an earlier version of this cipher. However, the 'hard fault' model requires a lot more assumption than the generic DFA. In this paper, we mount a DFA on ACORN v3 that requires 9 faults to obtain the state. In case of Grain v1 and ACORN v3, we can obtain the secret key once the state is known. However, that is not immediate in case of Lizard. While we have used the basic framework of DFA that appears in literature quite frequently, specific tweaks have to be explored to mount the actual attacks that were not used earlier. To the best of our knowledge, these are the best known DFAs on these three ciphers.
引用
收藏
页码:247 / 263
页数:17
相关论文
共 50 条
  • [1] Fault Attack on ACORN v3
    Zhang, Xiaojuan
    Feng, Xiutao
    Lin, Dongdai
    COMPUTER JOURNAL, 2018, 61 (08): : 1166 - 1179
  • [2] Fault attack on acorn V3
    Zhang, Xiaojuan (zhangxiaojuan@iie.ac.cn), 2018, Oxford University Press (61):
  • [3] Certain Observations on ACORN v3 and Grain v1—Implications Towards TMDTO Attacks
    Akhilesh Anilkumar Siddhanti
    Subhamoy Maitra
    Nishant Sinha
    Journal of Hardware and Systems Security, 2019, 3 (1) : 64 - 77
  • [4] HIGH-RESOLUTION SPECTRA OF V1 + V3 AND (V1 + V2 + V3)-V2 BANDS OF SO2
    BARBE, A
    SECROUN, C
    JOUVE, P
    DUTERAGE, B
    MONNANTEUIL, N
    BELLET, J
    STEENBECKELIERS, G
    JOURNAL OF MOLECULAR SPECTROSCOPY, 1975, 55 (1-3) : 319 - 350
  • [5] CORIOLIS INTERACTION IN V1 AND V3 FUNDAMENTALS OF OZONE
    CLOUGH, SA
    KNEIZYS, FX
    JOURNAL OF CHEMICAL PHYSICS, 1966, 44 (05): : 1855 - &
  • [6] FOURIER-TRANSFORM SPECTROSCOPY OF THE V1 AND V1 + V3 BAND REGIONS OF OCSE
    SUEOKA, K
    HAMADA, Y
    UEHARA, H
    JOURNAL OF MOLECULAR SPECTROSCOPY, 1988, 127 (02) : 370 - 381
  • [7] V3 AND V1 BANDS OF NT3 MOLECULE
    JONES, LH
    BRIM, WW
    RAO, KN
    JOURNAL OF MOLECULAR SPECTROSCOPY, 1963, 11 (05) : 389 - &
  • [8] STUDY OF THE V1 + V3 AND V1 + V6 INFRARED BANDS OF METHYL-CHLORIDE
    BENSARIZIZI, N
    ALAMICHEL, C
    GUELACHVILI, G
    CANADIAN JOURNAL OF PHYSICS, 1981, 59 (08) : 994 - 1008
  • [9] Near Collision Attack Against Grain V1
    Banik, Subhadeep
    Collins, Daniel
    Meier, Willi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023, 2023, 13905 : 178 - 207
  • [10] State recovery attack on ACORN v3 in nonce-reuse setting
    Zhang, Guoshuang
    Chen, Xiao
    Lin, Dongdai
    Liu, Fengmei
    Tongxin Xuebao/Journal on Communications, 2020, 41 (08): : 11 - 21