Differential power analysis of stream ciphers with LFSRs

被引:5
|
作者
Qu, Bo [1 ]
Gu, Dawu [1 ]
Guo, Zheng [2 ]
Liu, Junrong [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Microelect, Shanghai 200240, Peoples R China
[3] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Side-channel attack; Differential power analysis; Correlation coefficient; Stream cipher; Linear feedback shift register; Crypto-1;
D O I
10.1016/j.camwa.2012.02.024
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively, but only a few systematic studies on the applicability of side-channel attacks to stream ciphers could be found. The objective of the present study is to develop general differential power analysis techniques which can be employed to attack the stream ciphers with linear feedback shift registers. To illustrate the new approach, a common structure of a stream cipher with the basic components is given. Then the approach is employed to analyze the given structure. The results show that the linear feedback shift registers may leak the information of the secret key. The approach is also applied to Crypto-1 and the experimental results show that it is very effective. 28-bit information of the 48-bit secret key can be obtained just by analyzing some power traces. Furthermore, the present work may be helpful in analyzing a variety of stream ciphers with LFSRs. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1291 / 1299
页数:9
相关论文
共 50 条
  • [1] APPLICABILITY OF SIMPLE POWER ANALYSIS TO STREAM CIPHERS CONSTRUCTED USING MULTIPLE LFSRS
    Zadeh, Abdulah Abdulah
    Heys, H. M.
    2012 25TH IEEE CANADIAN CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (CCECE), 2012,
  • [2] Differential power analysis of stream ciphers
    Fischer, W.
    Gammel, B. M.
    Kniffler, O.
    Velten, J.
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 257 - 270
  • [3] On employment of LFSRs over GF(q) in certain stream ciphers
    Camion, P
    Mihaljevic, M
    Imai, H
    ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 210 - 210
  • [4] On power analysis attacks against hardware stream ciphers
    Silva, Rangana De
    Navaratna, Iranga
    Kumarasiri, Malitha
    Alawatugoda, Janaka
    Wen, Chuah Chai
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (1-2) : 21 - 35
  • [5] Evolutionary ciphers against differential power analysis and differential fault analysis
    TANG Ming1
    2School of Computers
    3International School of Software
    ScienceChina(InformationSciences), 2012, 55 (11) : 2555 - 2569
  • [6] Evolutionary ciphers against differential power analysis and differential fault analysis
    Tang Ming
    Qiu ZhenLong
    Yang Min
    Cheng PingPan
    Gao Si
    Liu ShuBo
    Meng QinShu
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (11) : 2555 - 2569
  • [7] Evolutionary ciphers against differential power analysis and differential fault analysis
    Ming Tang
    ZhenLong Qiu
    Min Yang
    PingPan Cheng
    Si Gao
    ShuBo Liu
    QinShu Meng
    Science China Information Sciences, 2012, 55 : 2555 - 2569
  • [8] Correlation Power Analysis Attack against Synchronous Stream Ciphers
    Wu, Keke
    Li, Huiyun
    Peng, Bo
    Yu, Fengqi
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2067 - +
  • [9] High order differential attacks on stream ciphers
    Knellwolf, Simon
    Meier, Willi
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (3-4): : 203 - 215
  • [10] Stream Ciphers Analysis Methods
    Bucerzan, D.
    Craciun, M.
    Chis, V.
    Ratiu, C.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2010, 5 (04) : 483 - 489