Phase-shift Fault Analysis of Grain v1
This paper deals with the phase-shift fault analysis of stream cipher Grain v1. We assume that the attacker is able to desynchronize the linear and nonlinear registers of the cipher during the keystream generation phase by either forcing one of the registers to clock one more time, while the other r...
Main Authors: | Viliam Hromada, Pethő Tibor |
---|---|
Format: | Article |
Language: | English |
Published: |
Polish Academy of Sciences
2018-05-01
|
Series: | International Journal of Electronics and Telecommunications |
Subjects: | |
Online Access: | https://journals.pan.pl/Content/103841/PDF/19_1154-4307-1-PB.pdf |
Similar Items
-
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers
by: Sayandeep Saha, et al.
Published: (2018-05-01) -
A Fault Attack on the Family of Enocoro Stream Ciphers
by: Julian Danner, et al.
Published: (2021-09-01) -
Trivium Stream Cipher Countermeasures Against Fault Injection Attacks and DFA
by: F. E. Potestad-Ordonez, et al.
Published: (2021-01-01) -
Optimizing Fast Near Collision Attack on Grain Using Linear Programming
by: Senshan Pan, et al.
Published: (2019-01-01) -
Improved Related-Cipher Attack on Salsa20 Stream Cipher
by: Lin Ding
Published: (2019-01-01)