Research Article

Fault Attack on the Authenticated Cipher ACORN v2

Table 3

The distribution of the strings (fault injected in , ).

ksl nup (%) 2nup (%) 3nup (%) 4nup (%) 5nup (%) 6nup (%)7nup (%) Others (%)

99 4.1213 69.88 13.52 2.24 1.96 0.38 0.61 11.2
103 1.7420 53.91 20.29 7.93 2.40 1.30 1.93 12.24
107 1.2722 58.60 18.70 6.60 2.59 2.72 1.938.87
111 1.0206 61.06 20.36 2.95 3.33 3.48 1.337.49
115 0.8569 61.57 21.40 2.59 2.13 4.54 1.65 6.12
119 0.6744 67.69 18.33 2.59 1.74 4.02 1.364.28
123 0.4512 73.92 14.58 2.92 1.42 3.55 0.76 2.85
127 0.2991 74.33 16.55 2.33 1.75 2.26 0.70 2.07
131 0.2225 85.77 9.26 2.44 0.43 1.11 0.56 0.43
1350.158290.486.691.810.48 0.5400
139 0.1518 89.38 8.42 1.32 0.75 0 0.13 0
143 0.1320 91.98 6.72 1.08 0.07 0 0.14 0
145 0.1275 89.60 9.27 0.60 0.15 0.07 0.30 0
147 0.1174 89.93 7.80 1.79 0.08 0.16 0.240
1510.077090.838.800.370000
155 0.0773 92.73 6.04 0.86 0.25 0 0.12 0
159 0.0649 94.71 4.55 0.73 0 0 00
1630.065094.435.5700000
167 0.0548 94.43 5.57 0 0 0 00

ksl: the length of keystream; nup: the proportion of the strings not locating a fault; nup (): the proportion of the strings that can determine optional fault locations among all strings not locating a fault; others: the proportion of the strings that can determine more than 7 optional fault locations among all strings not locating a fault.