2016
DOI: 10.1016/j.jisa.2016.03.003
|View full text |Cite
|
Sign up to set email alerts
|

Full key recovery of ACORN with a single fault

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…In 2014, Wu had submitted an authenticated encryption cipher, known as ACORN v1 to CAESAR competition. After then, some attacks on ACORN v1 and its tweaked version ACORN v2 were presented in [5][6][7][8][9][10][11]. Besides these attacks, a cube attack on 477 rounds of ACORN v2 was proposed in [12] to recover the 128-bit key with a total attack complexity of 2 35 , and when the goal is to recover one bit of the secret key, 503 rounds of ACORN v2 were attacked.…”
Section: Previous Attacks On Acornmentioning
confidence: 99%
“…In 2014, Wu had submitted an authenticated encryption cipher, known as ACORN v1 to CAESAR competition. After then, some attacks on ACORN v1 and its tweaked version ACORN v2 were presented in [5][6][7][8][9][10][11]. Besides these attacks, a cube attack on 477 rounds of ACORN v2 was proposed in [12] to recover the 128-bit key with a total attack complexity of 2 35 , and when the goal is to recover one bit of the secret key, 503 rounds of ACORN v2 were attacked.…”
Section: Previous Attacks On Acornmentioning
confidence: 99%
“…3) Fides: A single pass block cipher authenticated encryption algorithm, FIDES uses either 80-bit or 96-bit keys [58]. www.ijacsa.thesai.org 4) ACRON: 128-bit authenticated encryption algorithm efficient in both hardware and software implementations [59].…”
Section: Facet 3: Confidentialitymentioning
confidence: 99%
“…The cost associated with different fault models varies depending on the fault injection technique [9]. The permanent fault injection can be achieved by simply cutting a wire [10] or by using sophisticated technology such as using laser beam as adopted in [11]. Injecting the faults with laser beam will require a higher cost but possibly provides more accuracy [9].…”
Section: Feasibility Of Fault Attacksmentioning
confidence: 99%
“…These results are theoretical, and we did not perform any experiments since the results are straightforward given that the faults can be applied in the implementation of the algorithm. However, we note that the fault models for our proposed key recovery attacks have been shown to work in hardware [12], and also adopted in several other research papers [11,14].…”
Section: Comparison Of Fault Based Key Recovery Attacksmentioning
confidence: 99%