A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities

被引:3
|
作者
Mazumdar, Bodhisatwa [1 ]
Ali, Sk. Subidh [1 ]
Sinanoglu, Ozgur [1 ]
机构
[1] New York Univ Abu Dhabi, Dept Engn, Design Excellence Lab, Abu Dhabi, U Arab Emirates
关键词
ARX; Salsa20; differential power analysis; correlation analysis DPA; success rate; Hamming weight; ALGORITHMS;
D O I
10.1145/2934677
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we present a compact implementation of the Salsa20 stream cipher that is targeted towards lightweight cryptographic devices such as radio-frequency identification (RFID) tags. The Salsa20 stream cipher, ann addition-rotation-XOR (ARX) cipher, is used for high-security cryptography in NEON instruction sets embedded in ARM Cortex A8 CPU core-based tablets and smartphones. The existing literature shows that although classical cryptanalysis has been effective on reduced rounds of Salsa20, the stream cipher is immune to software side-channel attacks such as branch timing and cache timing attacks. To the best of our knowledge, this work is the first to perform hardware power analysis attacks, where we evaluate the resistance of all eight keywords in the proposed compact implementation of Salsa20. Our technique targets the three subrounds of the first round of the implemented Salsa20. The correlation power analysis (CPA) attack has an attack complexity of 2(19). Based on extensive experiments on a compact implementation of Salsa20, we demonstrate that all these keywords can be recovered within 20,000 queries on Salsa20. The attacks show a varying resilience of the key words against CPA that has not yet been observed in any stream or block cipher in the present literature. This makes the architecture of this stream cipher interesting from the side-channel analysis perspective. Also, we propose a lightweight countermeasure that mitigates the leakage in the power traces as shown in the results of Welch's t-test statistics. The hardware area overhead of the proposed countermeasure is only 14% and is designed with compact implementation in mind.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Power Analysis Attacks on ARX: An Application to Salsa20
    Mazumdar, Bodhisatwa
    Ali, Sk Subidh
    Sinanoglu, Ozgur
    2015 IEEE 21ST INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2015, : 40 - 43
  • [2] Hardware implementation of the Salsa20 and Phelix stream ciphers
    Yan, Junjie
    Heys, Howard M.
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1125 - 1128
  • [3] On the Salsa20 Core Function
    Hernandez-Castro, Julio Cesar
    Tapiador, Juan M. E.
    Quisquater, Jean-Jacques
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 462 - +
  • [4] Double-A - A Salsa20 like
    Issa, Abdullah
    Al-Ahmad, Mohammad A.
    Al-Saleh, Abdullah
    2015 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2015, : 18 - 23
  • [5] Slid Pairs in Salsa20 and Trivium
    Priemuth-Schmid, Deike
    Biryukov, Alex
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 1 - 14
  • [6] DOUBLE-A - A Salsa20 like
    Al-Saleh, Abdullah
    Al-Ahmmad, Mohammed
    Issa, Abdullah
    Al-Foudery, Adel
    2015 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2015, : 24 - 29
  • [7] Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of PNBs
    Ghafoori, Nasratullah
    Miyaji, Atsuko
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 520 - 536
  • [8] Implementation of Stream Cipher Salsa20 Algorithm to Secure Voice on Push to Talk Application
    Afdhila, Diyana
    Nasution, Surya Michrandi
    Azmi, Fairuz
    2016 IEEE ASIA PACIFIC CONFERENCE ON WIRELESS AND MOBILE (APWIMOB), 2016, : 137 - 141
  • [9] PNB Based Differential Cryptanalysis of Salsa20 and ChaCha
    Ghafoori, Nasratullah
    Miyaji, Atsuko
    Ito, Ryoma
    Miyashita, Shotaro
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (09) : 1407 - 1422
  • [10] Salsa20的差分故障分析
    申延成
    谢端强
    李超
    计算机工程与科学, 2011, 33 (03) : 7 - 12