2018
DOI: 10.1007/978-3-030-05072-6_9
|View full text |Cite
|
Sign up to set email alerts
|

Correlation Power Analysis on KASUMI: Attack and Countermeasure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…The low power consumption of the Midori block cipher seems to be the main reason for researchers to work with both 64-bit and 128-bit versions of this block cipher, as saving resources and power consumption is a critical factor to consider today. The first study on the power analysis attack to the Midori block cipher was conducted by Heuser et al in 2017 [12]. They examined the resilience of a few other lightweight ciphers against power analysis attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The low power consumption of the Midori block cipher seems to be the main reason for researchers to work with both 64-bit and 128-bit versions of this block cipher, as saving resources and power consumption is a critical factor to consider today. The first study on the power analysis attack to the Midori block cipher was conducted by Heuser et al in 2017 [12]. They examined the resilience of a few other lightweight ciphers against power analysis attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To our best knowledge, for the first time in this paper, a CPA is performed on the version of the Midori-64 block cipher implemented on the AVR microcontroller. Another innovation of this research is improved efficiency of CPA to the Midori-64 block cipher to reach the master key using less sample number and lower computational complexity related to [12].…”
Section: Innovationmentioning
confidence: 99%
“…In this attack, the authors can carry the attack successfully with the help of 2 16 key guesses. Recently, Gupta et al presented a CPA over KASUMI block cipher. This attack is a two‐step attack in which the FL function is attacked first, and then the result of FL function is used to attack the 7 × 7 and 9 × 9 S‐boxes incorporated in the FO function of the cipher.…”
Section: Related Workmentioning
confidence: 99%