Research Article
Fault Attack on the Authenticated Cipher ACORN v2
| (1) Choose initial states randomly | | (2) for each initial state do | | (3) proceed the encryption phase of ACORN v2 to get a 180-bit keystream | | (4) Choose fault locations randomly, where | | (5) for each fault locations do | | (6) | | (7) proceed the encryption phase of ACORN v2 to get a 180-bit keystream | | (8) for different length of keystream from 99 to 180 do | | (9) determine the fault location with | | (10) calculate the number of optional fault locations | | (11) end for | | (12) end for | | (13) end for | | (14) return the numbers of optional fault locations |
|