2021
DOI: 10.1109/access.2021.3078845
|View full text |Cite
|
Sign up to set email alerts
|

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD

Abstract: Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in the National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis of Grain-128AEAD against fault attacks. We investigate the application of three differential fault attack models on Grain-128AEAD. All these attacks can recover the initial state of Grain-128AEAD. First, we demonstrate an attack using a bit-flipping fault that re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 26 publications
(29 reference statements)
0
13
0
Order By: Relevance
“…Salam et al [67] presented three differential fault attack models to Grain-128AEAD to recover the state of the Grain using a small number of faulty outputs. To identify potential fault targets, they generated and analyzed the algebraic normal form (ANF) of consecutive keystream bits.…”
Section: Differential Fault Attacks (Dfa)mentioning
confidence: 99%
“…Salam et al [67] presented three differential fault attack models to Grain-128AEAD to recover the state of the Grain using a small number of faulty outputs. To identify potential fault targets, they generated and analyzed the algebraic normal form (ANF) of consecutive keystream bits.…”
Section: Differential Fault Attacks (Dfa)mentioning
confidence: 99%
“…This work presents a set of fault attacks that successfully recovers the majority of the internal state bits of Grain-128AEAD [2,3] . As an improvement of the research by Salam et al [4] , we have investigated two more relaxed fault attack models-a two-byte moderate control model assuming the injection of a random fault into two consecutive bytes and a four-byte moderate control model assuming the injection of a random fault into four consecutive bytes. This paper shows that the improved attack, a combined probabilistic-deterministic fault attack of more relaxed moderate control models, is feasible to identify all the required target fault registers in the linear feedback shift register (LFSR).…”
Section: Introductionmentioning
confidence: 99%
“…This way it minimizes energy consumption during the computation and saves the battery life of the IoT devices. Existing research ignored prior information of the compression percentage, however, the proposed approach has taken into account how much compression required for any input dataset. This makes it a user‐centered approach. The proposed model uses stream cipher 25,26 for the encryption and decryption in order to ensure the security during the data transmission from client to server side or vice‐versa. Stream cipher is the faster and more secure technique for light‐weighted IoT devices as it uses simple XOR operation, and it is also reliable for data transmission which is continuous in nature.…”
Section: Introductionmentioning
confidence: 99%
“…Stream ciphers are generally best for the cases where the amount of data is either continuous or unknown such as network streams. Salam et al in 2021 26 Grain‐128AEAD is a lightweight authenticated encryption stream cipher that has been subjected to an independent third‐party analysis for fault attacks. Camtepe et al in 2021 27 researcher proposed solutions for joint compression and encryption (compcrypt).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation