Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD
نویسندگان
چکیده
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in National Institute Standards Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis against fault attacks. We investigate application three differential attack models on Grain-128AEAD. All these attacks can recover initial state First, we demonstrate using bit-flipping that requires access to 2 7.80 faulty outputs state. Then, with more relaxed assumption random probabilistic approach. Our xmlns:xlink="http://www.w3.org/1999/xlink">11.60 xmlns:xlink="http://www.w3.org/1999/xlink">10.45 injections success rate over 99%. Both above two are based precise control target. Finally, apply deterministic approach (can conclusively determine value) different precision controls. For control, use existing approaches have been applied other ciphers, such as Tiaoxin-346. also propose technique for less stringent models, moderate no which practical than control. result indicates average xmlns:xlink="http://www.w3.org/1999/xlink">7.64 data complexity xmlns:xlink="http://www.w3.org/1999/xlink">8.80 . The weak injection hence, best presented this paper; expected require about xmlns:xlink="http://www.w3.org/1999/xlink">9.39 xmlns:xlink="http://www.w3.org/1999/xlink">12.98 discussed verified experimentally.
منابع مشابه
Differential Attacks against the Helix Stream Cipher
In this paper, we analyze the security of the stream cipher Helix, recently proposed at FSE’03. Helix is a high-speed asynchronous stream cipher, with a built-in MAC functionality. We analyze the differential properties of its keystream generator and describe two new attacks. The first attack requires 2 basic operations and processes only 2 words of chosen plaintext in order to recover the secr...
متن کاملVMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
A stream cipher based algorithm for computing Message Authentication Codes is described. The algorithm employs the internal state of the underlying cipher to minimize the required additional-toencryption computational effort and maintain general simplicity of the design. The scheme appears to provide proper statistical properties, a comfortable level of resistance against forgery attacks in a c...
متن کاملAnalysis of Stream Cipher Based Authenticated Encryption Schemes
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric...
متن کاملPractical Fault Attacks on Authenticated Encryption Modes for AES
Since the first demonstration of fault attacks by Boneh et al. on RSA, a multitude of fault attack techniques on various cryptosystems have been proposed. Most of these techniques, like Differential Fault Analysis, Safe Error Attack, and Collision Fault Analysis have the requirement to process two inputs that are either identical or related, in order to generate pairs of correct/faulty cipherte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3078845