Research Article

Fault Attack on the Authenticated Cipher ACORN v2

Algorithm 2

(1) Choose initial states randomly
(2) for  each initial state  do
(3) proceed the encryption phase of ACORN v2 to get a 180-bit keystream
(4) Choose fault locations randomly, where
(5) for  each fault locations   do
(6)
(7) proceed the encryption phase of ACORN v2 to get a 180-bit keystream
(8) for  different length of keystream from 99 to 180  do
(9) determine the fault location with
(10) calculate the number of optional fault locations
(11) end for
(12) end for
(13) end for
(14) return  the numbers of optional fault locations