Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
نویسندگان
چکیده
Over a decade, cryptographers are more attentive on designing lightweight ciphers in focus to compact cryptographic devices. More often, the security of these algorithms are defined in terms of its resistance to mathematical cryptanalysis methods. Nevertheless, designers are well aware of implementation attacks and concentrating on new design strategies to improve the defence quality against implementation attack. PRINCE [3] and RECTANGLE [17] lightweight block ciphers are designed using new design strategies for efficiency and security. In this paper we analyse the security of PRINCE and RECTANGLE against a type of implementation attack called Differential Power Analysis (DPA) attack. Our attack reduces key search space from 2 to 33008 for PRINCE and 2 to 288 for RECTANGLE.
منابع مشابه
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study Using PRINCE
Lightweight ciphers become indispensable and inevitable in the ubiquitous smart devices. However, the security of ciphers is often subverted by various types of attacks, especially, implementation attacks such as side-channel attacks. These attacks emphasise the necessity of providing efficient countermeasures. In this paper, our contribution is threefold: First, we observe and resolve the inac...
متن کاملBinary Ring-LWE Hardware with Power Side-Channel Countermeasures
We describe the first hardware implementation of a quantum-secure encryption scheme along with its lowcost power side-channel countermeasures. The encryption uses an implementation-friendly Binary-Ring-Learning-with-Errors (BRLWE) problem with binary errors that can be efficiently generated in hardware. We demonstrate that a direct implementation of BRLWE exhibits vulnerability to power side-ch...
متن کاملA High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks
This paper presents an enhanced side-channel attack using a phase-based waveform matching technique. Conventionally, side channel attacks such as Simple Power Analysis (SPA) and Differential Power Analysis (DPA) capture signal waveforms (e.g., power traces) with a trigger signal or a system clock, and use a statistical analysis of the waveforms to reduce noise and to retrieve secret information...
متن کاملPower Analysis Attacks Against FPGA Implementations of the DES
Cryptosystem designers frequently assume that secret parameters will be manipulated in tamper resistant environments. However, physical implementations can be extremely difficult to control and may result in the unintended leakage of side-channel information. In power analysis attacks, it is assumed that the power consumption is correlated to the data that is being processed. An attacker may th...
متن کاملEvolution Cipher against Differential Power Attack
Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized to construct different countermeasures against DPAs, such as balancing technologies. We propose a novel methodology to implement a secure DPA resistant crypto processor and we name this as evolutionary cipher(EVOC). EVO...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014