Secure Implementation of Stream Cipher: Trivium

被引:2
|
作者
Shanmugam, Dillibabu [1 ]
Annadurai, Suganya [1 ]
机构
[1] Soc Elect Transact & Secur, Hardware Secur Res Grp, Madras, Tamil Nadu, India
关键词
Trivium; Differential power analysis attack; Threshold implementation and algorithm level countermeasure; POWER ANALYSIS;
D O I
10.1007/978-3-319-27179-8_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trivium is a hardware oriented synchronous stream cipher designed by Christophe De Canniere and Bart Preneel [7]. Trivium is one of the eSTREAM final portfolio cipher. Regardless of the security of the cipher in theory, implementation attacks like Differential Power Analysis (DPA) attack [10,12,18] and Fault attack [9] on Trivium were observed. DPA attack of Trivium exploits the re-synchronization phase of the algorithm to reveal the key. In this paper, we analyse various implementation techniques as countermeasures for Trivium stream cipher against DPA attack. First, we present Threshold Implementation (TI) of Trivium using random mask value. Second, we propose algorithm level changes (Modified Trivium) to counteract the attack, which introduces negligible resource overhead to the implementation. Third, random accelerator concept is introduced for parallel architecture along with combined techniques of TI and algorithm level changes to further increase the attack complexity. Finally, we present comparative study on the performance of Trivium for the proposed techniques.
引用
收藏
页码:253 / 266
页数:14
相关论文
共 50 条
  • [1] Low Power Implementation of Trivium Stream Cipher
    Mora-Gutierrez, J. M.
    Jimenez-Fernandez, C. J.
    Valencia-Barrero, M.
    [J]. INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2013, 7606 : 113 - 120
  • [2] Correlation power analysis attack on software implementation of TRIVIUM stream cipher
    De Silva, Rangana
    Navarathna, Iranga
    Kumarasiri, Malitha
    Chuah, Chai Wen
    Alawatugoda, Janaka
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (3-4) : 379 - 401
  • [3] Slide attack on modified Trivium stream cipher
    Guan, Jie
    Ding, Lin
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2012, 46 (06): : 926 - 930
  • [4] State cycles, initialization and the Trivium stream cipher
    Simpson, Leonie
    Boztas, Serdar
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (3-4): : 245 - 258
  • [5] State cycles, initialization and the Trivium stream cipher
    Leonie Simpson
    Serdar Boztas
    [J]. Cryptography and Communications, 2012, 4 : 245 - 258
  • [6] Quavium - A New Stream Cipher Inspired by Trivium
    Tian, Yun
    Chen, Gongliang
    Li, Jianhua
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (05) : 1278 - 1283
  • [7] Energy-efficient Masking of the Trivium Stream Cipher
    Montoya, Maxime
    Hiscock, Thomas
    Bacles-Min, Simone
    Molnos, Anca
    Fournier, Jacques J. A.
    [J]. 2018 25TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2018, : 393 - 396
  • [8] Fault Attack on FPGA implementations of Trivium Stream Cipher
    Potestad-Ordonez, F. E.
    Jimenez-Fernandez, C. J.
    Valencia-Barrero, M.
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 562 - 565
  • [9] The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
    Mroczkowski, Piotr
    Szmidt, Janusz
    [J]. FUNDAMENTA INFORMATICAE, 2012, 114 (3-4) : 309 - 318
  • [10] CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata
    Karmakar, Sandip
    Mukhopadhyay, Debdeep
    Chowdhury, Dipanwita Roy
    [J]. JOURNAL OF CELLULAR AUTOMATA, 2012, 7 (02) : 179 - 197