UPM Institutional Repository

New vulnerabilities upon Grain v0 Boolean function through fault injection analysis


Citation

Omar@Othman, Wan Zariman and Kamel Ariffin, Muhammad Rezal and Mohd. Jawi, Suhairi and Mahad, Zahari (2021) New vulnerabilities upon Grain v0 Boolean function through fault injection analysis. OIC-CERT Journal of Cyber Security, 3 (1). 65 - 74. ISSN 2636-9680; ESSN: 2682-9266

Abstract

Algebraic attacks on stream cipher are very important in cryptography as well as in cryptanalysis. Generally, increasing degree of the equation will make an algebraic attack to the equation hardest. In conducting this analysis, we aim to decrease the degree of the targeted Boolean equation by constructing low degree annihilator equation(s). We adopt the Fault Injection Analysis (FIA) methodology to achieve our objectives. In this study, we found annihilator(s) through FIA (inject with value of one (1)) on Boolean function of selected stream ciphers. With the new injected Boolean functions developed, we proceed to utilize Hao’s method to find new annihilator(s). Then we established new annihilator(s) of Grain v0’s Boolean function. As a result, these newly identified annihilator(s) successfully reduce the complexity of the published Boolean function to guess the initial secret key. It also provides much needed information on the security and vulnerability of these selected stream cipher with respect to FIA.


Download File

Full text not available from this repository.

Additional Metadata

Item Type: Article
Divisions: Institute for Mathematical Research
Publisher: CyberSecurity Malaysia Publication
Keywords: Vulnerabilities; Boolean function; Fault Injection Analysis (FIA); Stream cipher; Annihilator
Depositing User: Ms. Nur Faseha Mohd Kadim
Date Deposited: 03 May 2023 08:23
Last Modified: 03 May 2023 08:23
URI: http://psasir.upm.edu.my/id/eprint/94355
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item