Open iceman1001 opened 7 years ago
The most important question: Where is it used in?
Well, http://www.legic.com/en/1093628/atc256-atc1024.html further down this page, you see where it is used.
I am also concerned about this issue, legic card use is very extensive. The realization of this algorithm, the rfid aspects of security have a great help
To implement a kernel for a generic Grain 128a plainttext attack.
Havn't found a naive implementation.
Background Stream cipher, Grain 128a, uses a key (128bit), IV (96bit) and outputs 32bit MAC. The legic Advant tags uses the newer Grain 128a,
Grain 128a (with test vectors in appendix) , tips and suggestions on optimisation https://lup.lub.lu.se/search/ws/files/3454246/2296485.pdf wiki: https://en.wikipedia.org/wiki/Grain_128a
another paper, that also explains the cipher. http://ws680.nist.gov/publication/get_pdf.cfm?pub_id=913678