A New Approach for Side Channel Analysis on Stream Ciphers and Related Constructions

被引:4
作者
Baksi, Anubhab [1 ]
Kumar, Satyam [2 ]
Sarkar, Santanu [2 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Indian Inst Technol, Dept Math, Chennai 600036, Tamil Nadu, India
关键词
Ciphers; Hamming weight; Computational modeling; Noise measurement; Analytical models; Hardware; Hamming distance; Stream cipher; LIZARD; PLANTLET; GRAIN-128-AEAD; side channel analysis; ATTACK;
D O I
10.1109/TC.2021.3135191
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side Channel Analysis (SCA) is among the newly emerged threats to small scale devices performing a cryptographic operation. While such analysis is well studied against the block ciphers, we observe that the stream cipher counterpart is not that much explored. We propose novel modelling that can work with a number of stream ciphers and related constructions. We show practical state/key recovery attacks on the lightweight ciphers, LIZARD, PLANTLET and GRAIN-128-AEAD. We consider the software platform (where the Hamming weight leakage is available) as well as the hardware platform (where the Hamming distance leakage is available). Through the modelling of Satisfiability Modulo Theory (SMT), we show that the solution can be obtained in a matter of seconds in most cases. In a handful of cases, however, the entire state/key recovery is not feasible in a practical amount of time. For those cases, we show full recovery is possible when a small number of bits are guessed. We also study the effect of increasing/decreasing the number of keystream bits on the solution time. Following a number of literature, we initially assume the traces that are obtained are noiseless. Later, we show how an extension of our model can deal with the noisy traces (which is a more general assumption).
引用
收藏
页码:2527 / 2537
页数:11
相关论文
共 27 条
  • [1] Grain-128a: A new version of Grain-128 with optional authentication
    Ågren M.
    Hell M.
    Johansson T.
    Meier W.
    [J]. International Journal of Wireless and Mobile Computing, 2011, 5 (01) : 48 - 59
  • [2] Baksi A., 2021, SILC WORKSH SEC IMPL
  • [3] Baksi A., 2020, Report 2020/1267
  • [4] Differential fault location identification by machine learning
    Baksi, Anubhab
    Sarkar, Santanu
    Siddhanti, Akhilesh
    Anand, Ravi
    Chattopadhyay, Anupam
    [J]. CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2021, 6 (01) : 17 - 24
  • [5] Cryptanalysis of Plantlet
    Banik, Subhadeep
    Barooti, Khashayar
    Isobe, Takanori
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (03) : 103 - 120
  • [6] Chakraborty A., 2015, IACR CRYPTOL EPRINT, V2015
  • [7] Related Key Chosen IV Attack on Grain-128a Stream Cipher
    Ding, Lin
    Guan, Jie
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 803 - 809
  • [8] Fischer W, 2007, LECT NOTES COMPUT SC, V4377, P257
  • [9] Gierlichs B., 2008, P WORKSH REC 2008, P123
  • [10] Hamann M, 2016, IACR CRYPTOL EPRINT, V2016, P926