[Resource Topic] 2014/261: Fault Analysis of Grain Family of Stream Ciphers

Welcome to the resource topic for 2014/261

Title:
Fault Analysis of Grain Family of Stream Ciphers

Authors: Sandip Karmakar, Dipanwita Roy Chowdhury

Abstract:

In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The earlier fault attacks on Grain work on LFSR whereas our target for fault induction is the NFSR. Our attack requires a small number of faults to be injected; 150 only for Grain v1 and only 312 and 384 for Grain-128 and Grain-128a, respectively. The number of faults are much lesser than the earlier reported fault attacks; 1587 for Grain-128 and 1831 for Grain-128a.

ePrint: https://eprint.iacr.org/2014/261

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .