Differential power analysis of stream ciphers with LFSRs

被引:5
|
作者
Qu, Bo [1 ]
Gu, Dawu [1 ]
Guo, Zheng [2 ]
Liu, Junrong [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Microelect, Shanghai 200240, Peoples R China
[3] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Side-channel attack; Differential power analysis; Correlation coefficient; Stream cipher; Linear feedback shift register; Crypto-1;
D O I
10.1016/j.camwa.2012.02.024
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively, but only a few systematic studies on the applicability of side-channel attacks to stream ciphers could be found. The objective of the present study is to develop general differential power analysis techniques which can be employed to attack the stream ciphers with linear feedback shift registers. To illustrate the new approach, a common structure of a stream cipher with the basic components is given. Then the approach is employed to analyze the given structure. The results show that the linear feedback shift registers may leak the information of the secret key. The approach is also applied to Crypto-1 and the experimental results show that it is very effective. 28-bit information of the 48-bit secret key can be obtained just by analyzing some power traces. Furthermore, the present work may be helpful in analyzing a variety of stream ciphers with LFSRs. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1291 / 1299
页数:9
相关论文
共 50 条
  • [21] LFSR based stream ciphers are vulnerable to power attacks
    Burman, Sanjay
    Nlukhopadhyay, Debdeep
    Veezhinathan, Kamakoti
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 384 - +
  • [22] Differential Random Fault Attacks on Certain CAESAR Stream Ciphers
    Wong, Kenneth Koon-Ho
    Bartlett, Harry
    Simpson, Leonie
    Dawson, Ed
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 297 - 315
  • [23] Application of simple power analysis to stream ciphers constructed using feedback shift registers
    Heys, Howard M. (hheys@mun.ca), 1600, Oxford University Press (58):
  • [24] On Analysis of Lightweight Stream Ciphers with Keyed Update
    Kara, Orhun
    Esgin, Muhammed F.
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (01) : 99 - 110
  • [25] An analysis of the Hermes8 Stream Ciphers
    Babbage, Steve
    Cid, Carlos
    Pramstaller, Norbert
    Raddum, Havard
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 1 - +
  • [26] Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers
    Zadeh, Abdulah Abdulah
    Heys, Howard M.
    COMPUTER JOURNAL, 2015, 58 (04): : 961 - 972
  • [27] Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers
    Diehl, William
    Abdulgadir, Abubakr
    Farahmand, Farnoud
    Kaps, Jens-Peter
    Gaj, Kris
    CRYPTOGRAPHY, 2018, 2 (03) : 1 - 32
  • [28] STREAM CIPHERS.
    Piper, Fred
    Elektrotechnik und Maschinenbau, 1987, 104 (12): : 564 - 568
  • [29] Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
    Diehl, William
    Abdulgadir, Abubakr
    Farahmand, Fainoud
    Kaps, Jens-Peter
    Gaj, Kris
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 147 - 152
  • [30] Kolmogorov Stream Ciphers
    Scharinger, Josef
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2009, 2009, 5717 : 1 - 8