Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 3834685, 16 pages
https://doi.org/10.1155/2017/3834685
Research Article

Fault Attack on the Authenticated Cipher ACORN v2

1State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
2School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
3Key Laboratory of Mathematics Mechanization, Academy of Mathematics and System Science, Chinese Academy of Sciences, Beijing, China

Correspondence should be addressed to Xiaojuan Zhang; nc.ca.eii@naujoaixgnahz

Received 9 May 2017; Revised 24 July 2017; Accepted 23 August 2017; Published 2 October 2017

Academic Editor: Angelos Antonopoulos

Copyright © 2017 Xiaojuan Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. CAESAR, “Cryptographic competitions,” http://competitions.cr.yp.to/index.html.
  2. W. Hongjun, ACORN: A Lightweight Authenticated Cipher (v1), CAESAR, 2014.
  3. W. Hongjun, ACORN: A Lightweight Authenticated Cipher (v2), CAESAR, 2015.
  4. W. Hongjun, ACORN, A Lightweight Authenticated Cipher (v3), CAESAR, 2016.
  5. L. Meicheng and L. Dongdai, “Cryptanalysis of Lightweight Authenticated Cipher ACORN,” Posed on the crypto-competition mailing list, 2014. View at Google Scholar
  6. C. Chaigneau, F. Thomas, and H. Gilbert, “Full Key-recovery on ACORN in Nonce-reuse and Decryption-misuse settings,” Posed on the crypto-competition mailing list, 2015. View at Google Scholar
  7. J. Johymalyo and S. Sarkar, “Some observations on ACORN v1 and Trivia-SC,” in Proceedings of the Lightweight Cryptography Workshop 2015, National Institute of Standards and Technology, Gaithersburg, Maryland, Md, USA, 2015.
  8. M. I. Salam, H. Bartlett, E. Dawson, J. Pieprzyk, L. Simpson, and K. K.-H. Wong, “Investigating cube attacks on the authenticated encryption stream cipher ACORN,” Communications in Computer and Information Science, vol. 651, pp. 15–26, 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. M. I. Salam, L. Simpson, K. K.-H. Wong, E. Dawson, H. Bartlett, and J. Pieprzyk, “Finding state collisions in the authenticated encryption stream cipher ACORN,” in Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016, aus, February 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. L. Frédéric, L. Lerman, M. Olivier, and V. H. Dirk, SAT-based cryptanalysis of ACORN, 2016.
  11. R. Dibyendu and S. Mukhopadhyay, “Some results on ACORN,” IACR Cryptology ePrint Archive, 1132, 2016.
  12. A. A. Siddhanti, S. Sarkar, S. Maitra, and A. Chattopadhyay, “Differential Fault Attack on Grain v1, ACORN v3 and Lizard,” Cryptology ePrint Archive: Report 2017/678, 2017.
  13. E. Biham and A. Shamir, “Differential fault analysis of secret key cryptosystems,” in Advances in Cryptology — CRYPTO '97, vol. 1294 of Lecture Notes in Computer Science, pp. 513–525, Springer Berlin Heidelberg, Berlin, Heidelberg, 1997. View at Publisher · View at Google Scholar
  14. J. J. Hoch and A. Shamir, “Fault analysis of stream ciphers,” in Cryptographic Hardware and Embedded Systems—CHES 2004, M. Joye and J.-J. Quisquater, Eds., vol. 3156 of Lecture Notes in Computer Science, pp. 240–253, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  15. S. Skorobogatov, “Optically Enhanced Position-Locked Power Analysis,” in Cryptographic Hardware and Embedded Systems - CHES 2006, vol. 4249 of Lecture Notes in Computer Science, pp. 61–75, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006. View at Publisher · View at Google Scholar
  16. S. P. Skorobogatov and R. J. Anderson, “Optical Fault Induction Attacks,” in Cryptographic Hardware and Embedded Systems - CHES 2002, vol. 2523 of Lecture Notes in Computer Science, pp. 2–12, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003. View at Publisher · View at Google Scholar
  17. H. Michal and R. Bohuslav, “Differential Fault Analysis of Trivium,” in Proceedings of the Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 2008.
  18. S. Mohamed, S. Bulygin, and J. A. Buchmann, “Using SAT Solving to Improve Differential Fault Analysis of Trivium,” in Proceedings of the Information Security and Assurance - International Conference, ISA 2011, Brno, Czech Republic, August 2011.
  19. G. Castagnos, B. Alexandre, C. Cécile et al., “Fault Analysis of Grain-128,” in Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 2009.
  20. S. Karmakar and D. R. Chowdhury, “Fault Analysis of Grain-128 by Targeting NFSR,” in Progress in Cryptology – AFRICACRYPT 2011, vol. 6737 of Lecture Notes in Computer Science, pp. 298–315, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011. View at Publisher · View at Google Scholar
  21. S. Banik, S. Maitra, and S. Sarkar, “A differential fault attack on the grain family of stream ciphers,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7428, pp. 122–139, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Sarkar, S. Banik, and S. Maitra, “Differential fault attack against Grain family with very few faults and minimal assumptions,” Institute of Electrical and Electronics Engineers. Transactions on Computers, vol. 64, no. 6, pp. 1647–1657, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. S. Banik and S. Maitra, “A Differential Fault Attack on MICKEY 2.0,” in Cryptographic Hardware and Embedded Systems - CHES 2013, vol. 8086 of Lecture Notes in Computer Science, pp. 215–232, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013. View at Publisher · View at Google Scholar
  24. S. Banik, S. Maitra, and S. Sarkar, “Improved differential fault attack on MICKEY 2.0,” Journal of Cryptographic Engineering, vol. 5, no. 1, pp. 13–29, 2015. View at Publisher · View at Google Scholar · View at Scopus