Research Article
Fault Attack on the Authenticated Cipher ACORN v2
(1) Choose initial states randomly | (2) for each initial state do | (3) proceed the encryption phase of ACORN v2 to get a 180-bit keystream | (4) Choose fault locations randomly, where | (5) for each fault locations do | (6) | (7) proceed the encryption phase of ACORN v2 to get a 180-bit keystream | (8) for different length of keystream from 99 to 180 do | (9) determine the fault location with | (10) calculate the number of optional fault locations | (11) end for | (12) end for | (13) end for | (14) return the numbers of optional fault locations |
|