In this paper, we first demonstrate a new Differential Power Analysis (DPA) attack technique against the Grain family of stream ciphers (Grain v1 and Grain-128) by resynchronizing the cipher multiple times with the same value of the secret \emph{key} and randomly generated different initialization vectors (IVs). Subsequently, we develop a combined side channel and fault analysis attack strategy targeting various fault attack countermeasures for the Grain cipher family. We considered clock glitch induced faults occurring in practice for a hardware implementation of the cipher to devise our novel attack technique. Our proposed combined attack strategy works well even if the \emph{useful} ciphertexts are not available to the adversary. Further...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Side-channel analysis and fault-injection attacks are known as serious threats to cryptographic hard...
Abstract—In this paper, we first demonstrate a new Dif-ferential Power Analysis (DPA) attack techniq...
Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extens...
This paper deals with the phase-shift fault analysisof stream cipher Grain v1. We assume that the at...
In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The e...
Very few differential fault attacks (DFA) were reported on {\em Grain-128} so far. In this paper we ...
In today's world of ubiquitous connectivity, communications security is an ever-present concern. In ...
The $32$-bit MAC of Grain-128a is a linear combination of the first 64 and then the alternative keys...
Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a s...
Side Channel Analysis (SCA) is among the newly emerged threats to small scale devices performing a c...
v1 to the estream call for stream cipher proposals and it also became one estream finalists in the h...
eSTREAM brought to the attention of the cryptographic community a number of stream ciphers including...
The threat of DPA attacks is of crucial importance when designing cryptographic hardware. This contr...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Side-channel analysis and fault-injection attacks are known as serious threats to cryptographic hard...
Abstract—In this paper, we first demonstrate a new Dif-ferential Power Analysis (DPA) attack techniq...
Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extens...
This paper deals with the phase-shift fault analysisof stream cipher Grain v1. We assume that the at...
In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The e...
Very few differential fault attacks (DFA) were reported on {\em Grain-128} so far. In this paper we ...
In today's world of ubiquitous connectivity, communications security is an ever-present concern. In ...
The $32$-bit MAC of Grain-128a is a linear combination of the first 64 and then the alternative keys...
Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a s...
Side Channel Analysis (SCA) is among the newly emerged threats to small scale devices performing a c...
v1 to the estream call for stream cipher proposals and it also became one estream finalists in the h...
eSTREAM brought to the attention of the cryptographic community a number of stream ciphers including...
The threat of DPA attacks is of crucial importance when designing cryptographic hardware. This contr...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Side-channel analysis and fault-injection attacks are known as serious threats to cryptographic hard...