Research Article
Fault Attack on the Authenticated Cipher ACORN v2
Require: A 99-bit differential string | Ensure: the fault locations | (1) Determine which category belongs to according to the position of its first 1 | (2) Determine the candidates by comparing other locations of 1 appearing in | and using the making-the-most-use-of-things strategy | (3) if the number of candidates is 1 then | (4) return the unique candidate | (5) else | (6) for the keystream length extended to bits, from 1 to 64 do | (7) use the making-the-most-use-of-things strategy | (8) compare the extra locations of 1 appearing in | (9) if the number of candidates can be reduced to 1 then | (10) return the unique candidate | (11) end if | (12) end for | (13) if the number of candidates is still larger than 1 then | (14) use the high probability priority strategy to choose the location that the | string appears in the with the highest probability | (15) return the unique candidate | (16) end if | (17) end if |
|