Differential power analysis of stream ciphers with LFSRs

被引:5
|
作者
Qu, Bo [1 ]
Gu, Dawu [1 ]
Guo, Zheng [2 ]
Liu, Junrong [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Microelect, Shanghai 200240, Peoples R China
[3] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Side-channel attack; Differential power analysis; Correlation coefficient; Stream cipher; Linear feedback shift register; Crypto-1;
D O I
10.1016/j.camwa.2012.02.024
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively, but only a few systematic studies on the applicability of side-channel attacks to stream ciphers could be found. The objective of the present study is to develop general differential power analysis techniques which can be employed to attack the stream ciphers with linear feedback shift registers. To illustrate the new approach, a common structure of a stream cipher with the basic components is given. Then the approach is employed to analyze the given structure. The results show that the linear feedback shift registers may leak the information of the secret key. The approach is also applied to Crypto-1 and the experimental results show that it is very effective. 28-bit information of the 48-bit secret key can be obtained just by analyzing some power traces. Furthermore, the present work may be helpful in analyzing a variety of stream ciphers with LFSRs. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1291 / 1299
页数:9
相关论文
共 50 条
  • [41] Implementation and analysis of stream ciphers based on the elliptic curves
    Deepthi, P. P.
    Nithin, V. S.
    Sathidevi, P. S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (02) : 300 - 314
  • [42] Analysis and design of nonlinear combining functions in stream ciphers
    Zhang, Muxiang
    Xiao, Guozhen
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1996, 24 (01): : 48 - 52
  • [43] Integrity analysis of authenticated encryption based on stream ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (05) : 493 - 511
  • [44] A new analysis method for nonlinear component of stream ciphers
    Zhao, Y. (zhaoyb1101@yahoo.com.cn), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):
  • [45] Analysis on randomness testing of three stream ciphers and their components
    Fan, Limin
    Feng, Dengguo
    Chen, Hua
    Gaojishu Tongxin/Chinese High Technology Letters, 2007, 17 (02): : 116 - 119
  • [46] Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers
    Beckers, Arthur
    Gierlichs, Benedikt
    Verbauwhede, Ingrid
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017), 2018, 10728 : 196 - 212
  • [47] Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 257 - 276
  • [48] An analysis of the statistical self-synchronization of stream ciphers
    Heys, HM
    IEEE INFOCOM 2001: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: TWENTY YEARS INTO THE COMMUNICATIONS ODYSSEY, 2001, : 897 - 904
  • [49] New design of LFSR based stream ciphers to resist power attack
    Zhao, Yongbin
    Hu, Yupu
    Jia, Yanyan
    Zhao, Y. (zhaoyb@stdu.edu.cn), 2013, Science Press (40): : 172 - 179
  • [50] Linear attacks on stream ciphers
    Hell M.
    Johansson T.
    Cryptology and Information Security Series, 2011, 7 : 55 - 85