Differential power analysis of stream ciphers with LFSRs

被引:5
|
作者
Qu, Bo [1 ]
Gu, Dawu [1 ]
Guo, Zheng [2 ]
Liu, Junrong [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Microelect, Shanghai 200240, Peoples R China
[3] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Side-channel attack; Differential power analysis; Correlation coefficient; Stream cipher; Linear feedback shift register; Crypto-1;
D O I
10.1016/j.camwa.2012.02.024
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively, but only a few systematic studies on the applicability of side-channel attacks to stream ciphers could be found. The objective of the present study is to develop general differential power analysis techniques which can be employed to attack the stream ciphers with linear feedback shift registers. To illustrate the new approach, a common structure of a stream cipher with the basic components is given. Then the approach is employed to analyze the given structure. The results show that the linear feedback shift registers may leak the information of the secret key. The approach is also applied to Crypto-1 and the experimental results show that it is very effective. 28-bit information of the 48-bit secret key can be obtained just by analyzing some power traces. Furthermore, the present work may be helpful in analyzing a variety of stream ciphers with LFSRs. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1291 / 1299
页数:9
相关论文
共 50 条
  • [31] Stream ciphers and correlation
    Brincat, K
    Piper, FC
    Wild, PR
    DIFFERENCE SETS, SEQUENCES AND THEIR CORRELATION PROPERTIES, 1999, 542 : 17 - 44
  • [32] Differential cryptanalysis of the stream ciphers Py, Py6 and Pypy
    Wu, Hongjun
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 276 - +
  • [33] A framework for chosen IV statistical analysis of stream ciphers
    Englund, Hakan
    Johansson, Thomas
    Turan, Meltem Soenmez
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 268 - +
  • [34] Performance and Statistical Analysis of Stream Ciphers in GSM Communications
    Yerukala, Nagendar
    Prasad, V. Kamakshi
    Apparao, Allam
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2020, 16 (01) : 11 - 18
  • [35] Integrity analysis of authenticated encryption based on stream ciphers
    Kazuya Imamura
    Kazuhiko Minematsu
    Tetsu Iwata
    International Journal of Information Security, 2018, 17 : 493 - 511
  • [36] The Implementation and Analysis of Important Symmetric Ciphers on Stream Processor
    Yao, Ping
    Xu, Mu
    Liu, Gu
    Xu, Guang
    An, Hong
    Han, Wenting
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 27 - 31
  • [37] Comparative analysis of the structures of eSTREAM submitted stream ciphers
    Afzal, Mehreen
    Kausar, Firdous
    Masood, Ashraf
    SECOND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES 2006, PROCEEDINGS, 2006, : 245 - +
  • [38] The analysis and realization of RC4 stream ciphers
    Zhuang, Peidong
    Ding, Qun
    Wang, Lu
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION (ICMS2009), VOL 4, 2009, : 448 - 452
  • [39] Analysis and design of modern stream ciphers - (Invited paper)
    Johansson, T
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 66 - 66
  • [40] A Statistical Analysis for High-Speed Stream Ciphers
    Harmouch, Youssef
    El Kouch, Rachid
    INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2017, 2018, 735 : 339 - 349