期刊文献+

Correlation power analysis of DECIM~v2 被引量:3

Correlation power analysis of DECIM~v2
原文传递
导出
摘要 Power analysis has been a powerful and thoroughly studied threat for implementations of block ciphers and public key algorithms but not yet for stream ciphers. Based on the consumed power differences between two neighboring clock cycles, this paper presents a correlation power analysis (CPA) attack on the synchronous stream cipher DECIM^v2 (the tweaked version of the original submission DECIM). This attack resynchronizes the cryptographic device ceaselessly with many different initialization values (IVs) to obtain enough power traces. Then by modeling the statistical properties of the differential power traces with the correlation coefficients, the proposed attack algorithm can completely reveal the secret key of DECIM^v2. Furthermore, a simulation attack is mounted to confirm the validity of the algorithm. The results show that the entire secret key of DECIM^v2 can be restored within several minutes by performing 12 CPA attacks. It seems that there are still some defects in the design of DECIM^v2 and thus some further improvements should be made to resist the proposed attack. Power analysis has been a powerful and thoroughly studied threat for implementations of block ciphers and public key algorithms but not yet for stream ciphers. Based on the consumed power differences between two neighboring clock cycles, this paper presents a correlation power analysis (CPA) attack on the synchronous stream cipher DECIM^v2 (the tweaked version of the original submission DECIM). This attack resynchronizes the cryptographic device ceaselessly with many different initialization values (IVs) to obtain enough power traces. Then by modeling the statistical properties of the differential power traces with the correlation coefficients, the proposed attack algorithm can completely reveal the secret key of DECIM^v2. Furthermore, a simulation attack is mounted to confirm the validity of the algorithm. The results show that the entire secret key of DECIM^v2 can be restored within several minutes by performing 12 CPA attacks. It seems that there are still some defects in the design of DECIM^v2 and thus some further improvements should be made to resist the proposed attack.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第5期118-123,共6页 中国邮电高校学报(英文版)
基金 supported by the National Basic Research Program of China (2007CB311201) the National Natural Science Foundation of China (60833008, 60803149)
关键词 CRYPTOGRAPHY CRYPTANALYSIS side channel attacks (SCA) CPA DECIM^v2 cryptography, cryptanalysis, side channel attacks (SCA), CPA, DECIM^v2
  • 相关文献

参考文献1

二级参考文献11

  • 1Jean-Jacques Quisquater and Math RiZK. Side channel attacks, http://www.ipa.go.jp/security/enc/CRYPTREC/ fy15/doc/1047_Side_Channel_report.pdf, 2008.9. 被引量:1
  • 2Zhou Yong-bin and Feng Deng-guo, et al.. Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing, http://eprint.iacr. org/2005 / 388.pdf, 2008.4. 被引量:1
  • 3Courtois N T and Meier W, et al.. Algebraic attacks on stream ciphers with linear feedback [C]. Advances in Eurocrypt 2003, Warsaw Poland, Lecture Notes in Computer Science, May 4-8, 2003, Vol. 2656: 345-359. 被引量:1
  • 4Kocher P C, Jae J, and Jun B, et al.. Differential power analysis [C]. CRYPTOv 99, Santa Barbara, CA, USA, Lecture Notes in Computer Science, Aug 15-19, 1999, Vol. 1666: 388-397. 被引量:1
  • 5Gierlichs B, Batina L, and Clavier C, et al.. Susceptibility of eSTREAM candidates towards side channel analysis. http://www.ecrypt.eu.org/stream, 2008.3. 被引量:1
  • 6ECRYPT. eSTREAM, http://www.ecrypt.eu.org/stream/, 2008.9. 被引量:1
  • 7Lano J, Mentens N, and Preneel B, et al.. Power analysis of synchronous stream ciphers with resynchronization mechanism [C]. SASC Workshop, Novotel Brugge Centrum, Belgium, Workshop Record, Oct 14-15, 2004: 327-333. 被引量:1
  • 8Burman S, Mukhopadhyay D, and Veezhinathan K, et al.. LFSR based stream ciphers are vulnerable to power attacks [C]. INDOCRYPT 2007, Chennai, INDIA, Lecture Notes in Computer Science, Dec 9-13, 2007, Vol. 4859: 384-392. 被引量:1
  • 9Fischer W, Gammel B M, and Kniffier O, et al.. Differential power analysis of stream ciphers [C]. CT-RSA 2007, San Francisco, CA, USA, Lecture Notes in Computer Science, Feb 5-9, 2007, Vol. 4377: 257-270. 被引量:1
  • 10Berbain C, Billet O, and Canteaut A, et al.. DECIMv2. http: / /www.ecrypt.eu.org/stream/ decim/ decim_p3.pdf, 2007.5. 被引量:1

共引文献7

同被引文献33

  • 1熊昌镇,邹建成,齐东旭.一种基于混沌映射的数字图像加密新算法[J].中山大学学报(自然科学版),2004,43(A02):29-33. 被引量:17
  • 2Kocher P C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems [G]// CRYPTO'1996, LNCS 1440. Berlin: Springer, 1996: 104-113. 被引量:1
  • 3Koeher P C, Jaffe J, Jun B. Differential Power Analysis[C]//CRYPTO'1999, LNCS 1666. Berlin: Springer, 1999: 388-397. 被引量:1
  • 4Lano J, Mentens N, Preneel B, et al. Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism [C]//SASC 2004, Workshop Record. Berlin: Springer-Verlag, 2004: 327-333. 被引量:1
  • 5Gierlichs B, Batina L, Clavier C, et al. Susceptibility of eSTREAM Candidates Towards Side Channel Analysis [EB/ OL]. [2012-02-23]. http://www, ecrypt, eu. org/stvl/sasc2008/index, html. 被引量:1
  • 6Fischer W, Gammel B M, Kniffler O, et al. Differential Power Analysis of Stream Ciphers [C]//Advances in Cryptology-CT-RSA 2007, LNCS 4377. Berlin: Springer, 2006: 257-270. 被引量:1
  • 7Burman S, Mukhopadhyay D, Veezhinathan K, et al. LFSR Based Stream Ciphers are Vulnerable to Power Attacks [C]//Advances in Crptology-INDOCRYPT'2007, LNCS 4859. Berlin: Springer, 2007: 384-392. 被引量:1
  • 8Steve B, Julia B, Vesselin V. The eSTREAM Portfolio in 2012 (Jan 2012) [EB/OL]. [2012-02-23]. http://www.ecrypt, eu. org/stream/.(12): 1709-1720. 被引量:1
  • 9Kumar S, Lemke K, Paar C. Some Thoughts about Implementation Properties of Stream Ciphers [C]//SASC 2004, Workshop Record. Berlin: Springer-Verlag, 2004: 311-319. 被引量:1
  • 10Key E L. An Analysis of the Structure and Complexity of Nonlinear Binary Sequence Generators [J]. IEEE Trans on Information Theory, 1976, 22(11): 732-736. 被引量:1

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部