A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities

被引:3
|
作者
Mazumdar, Bodhisatwa [1 ]
Ali, Sk. Subidh [1 ]
Sinanoglu, Ozgur [1 ]
机构
[1] New York Univ Abu Dhabi, Dept Engn, Design Excellence Lab, Abu Dhabi, U Arab Emirates
关键词
ARX; Salsa20; differential power analysis; correlation analysis DPA; success rate; Hamming weight; ALGORITHMS;
D O I
10.1145/2934677
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we present a compact implementation of the Salsa20 stream cipher that is targeted towards lightweight cryptographic devices such as radio-frequency identification (RFID) tags. The Salsa20 stream cipher, ann addition-rotation-XOR (ARX) cipher, is used for high-security cryptography in NEON instruction sets embedded in ARM Cortex A8 CPU core-based tablets and smartphones. The existing literature shows that although classical cryptanalysis has been effective on reduced rounds of Salsa20, the stream cipher is immune to software side-channel attacks such as branch timing and cache timing attacks. To the best of our knowledge, this work is the first to perform hardware power analysis attacks, where we evaluate the resistance of all eight keywords in the proposed compact implementation of Salsa20. Our technique targets the three subrounds of the first round of the implemented Salsa20. The correlation power analysis (CPA) attack has an attack complexity of 2(19). Based on extensive experiments on a compact implementation of Salsa20, we demonstrate that all these keywords can be recovered within 20,000 queries on Salsa20. The attacks show a varying resilience of the key words against CPA that has not yet been observed in any stream or block cipher in the present literature. This makes the architecture of this stream cipher interesting from the side-channel analysis perspective. Also, we propose a lightweight countermeasure that mitigates the leakage in the power traces as shown in the results of Welch's t-test statistics. The hardware area overhead of the proposed countermeasure is only 14% and is designed with compact implementation in mind.
引用
收藏
页数:26
相关论文
共 50 条
  • [21] Improved Salsa20 Stream Cipher Diffusion Based on Random Chaotic Maps
    Muhalhal, Lamia A.
    Alshawi, Imad S.
    INFORMATICA-AN INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS, 2022, 46 (07): : 95 - 102
  • [22] A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices
    Lara, Evangelina
    Aguilar, Leocundo
    Garcia, Jesus A.
    Sanchez, Mauricio A.
    SENSORS, 2018, 18 (10)
  • [23] Non-randomness in eSTREAM candidates Salsa20 and TSC-4
    Fischer, Simon
    Meier, Willi
    Berbain, Come
    Biasse, Jean-Francois
    Robshaw, M. J. B.
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 2 - +
  • [24] 一个改进的Salsa20流密码算法
    张中亚
    关杰
    丁林
    北京大学学报(自然科学版), 2011, 47 (02) : 201 - 207
  • [25] Proposed Color Image Lightweight Encryption using SALSA20 with Key Derivation Function
    Talib, Ebtehal
    Jamil, Abeer Salim
    Hassan, Nidaa Flaih
    BAGHDAD SCIENCE JOURNAL, 2025, 22 (01)
  • [26] 基于OpenCL的Salsa20算法实现与优化附视频
    尹浩
    于飞
    陈曼
    通信技术, 2020, (11) : 2790 - 2794
  • [27] EAMSA 512: New 512 Bits Encryption Algorithm Based on Modified SALSA20
    Naif, Jolan Rokan
    Ahmed, Israa S.
    Zaki, Nashwan Dheyaa
    Hoomod, Haider K.
    Iraqi Journal for Computer Science and Mathematics, 2023, 4 (02): : 131 - 142
  • [28] VLSI Hardware Evaluation of the Stream Ciphers Salsa20 and ChaCha, and the Compression Function Rumba
    Henzen, L.
    Carbognani, F.
    Felber, N.
    Fichtner, W.
    SCS: 2008 2ND INTERNATIONAL CONFERENCE ON SIGNALS, CIRCUITS AND SYSTEMS, 2008, : 223 - 227
  • [29] New Modified Twofish For Data Protection Using Salsa20 and L..u system
    Hoomod, Haider K.
    Hussein, Ahmed M.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1189 - 1195
  • [30] Implementing Salsa20 vs. AES and Serpent Ciphers in Popular-Grade FPGA Devices
    Sugier, Jaroslaw
    NEW RESULTS IN DEPENDABILITY AND COMPUTER SYSTEMS, 2013, 224 : 431 - 438