Research Article

Fault Attack on the Authenticated Cipher ACORN v2

Table 4

The distribution of the strings (fault injected in , ).

kslnupn0s2nup3nup4nup5nup6nup7nup8nup9nup10nupOthers

9937.1518.9325.7214.428.860.901.690.540.990.628.7218.60
10333.8214.3729.0914.299.801.611.840.300.690.4111.2316.39
10731.6510.9829.8815.6310.643.351.750.561.440.698.7416.33
11129.117.9031.2617.019.774.412.941.331.400.807.1816.00
11527.625.3133.3817.938.716.502.253.021.290.725.3215.57
11926.714.0238.4415.618.236.743.043.711.060.953.7314.47
12324.882.7637.8715.7510.306.823.093.792.271.633.1312.59
12722.491.7436.9617.0110.127.333.993.841.781.372.2913.57
13119.941.3837.2719.4510.846.863.634.551.931.322.1710.62
13518.180.6037.1820.6612.497.325.023.041.962.331.437.96
13917.600.2939.5921.0411.197.044.603.362.721.771.536.87
14317.060.1437.6621.8311.157.554.803.762.061.811.777.48
14517.130.2339.4821.4711.226.684.513.192.282.211.647.09
14716.670.2439.8422.6211.996.334.482.712.121.831.726.11
15115.850.0442.3221.7411.786.374.163.541.891.581.045.54
15515.240.0241.9322.5110.636.593.643.602.061.641.585.79
15915.270.1243.7323.1810.257.273.682.542.281.380.864.72
16314.45045.2424.019.575.724.562.372.131.541.273.59
16714.20045.1424.1610.436.193.742.711.831.421.103.29

In order to shorten the table, we omit the (%) in each column. The symbols are the same as in Table 3, except n0s: the proportion of the zero string among all strings not locating a fault; others: the proportion of the strings that can determine more than 10 optional fault locations among all strings not locating a fault.