2006
DOI: 10.1007/11967668_17
|View full text |Cite
|
Sign up to set email alerts
|

Differential Power Analysis of Stream Ciphers

Abstract: Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream ciphers. The few existing references mainly treat timing [10] and template attacks [13], or provide a theoretical analysis [8], [9] of weaknesses of stream cipher constructions. In this paper we present attacks on two focus candidates, Trivium and Grain, of the eS-TREAM stream cipher project. The attacks exploit the resynchroniza… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(38 citation statements)
references
References 7 publications
0
38
0
Order By: Relevance
“…Side-channel analysis of stream ciphers [1] is a class of novel attacks by combining physical and mathematical methods, including fault analysis [2], power analysis [3], timing analysis, etc. In the class of side-channel analysis, fault analysis is a powerful attack.…”
Section: A Background and Results Of Our Workmentioning
confidence: 99%
“…Side-channel analysis of stream ciphers [1] is a class of novel attacks by combining physical and mathematical methods, including fault analysis [2], power analysis [3], timing analysis, etc. In the class of side-channel analysis, fault analysis is a powerful attack.…”
Section: A Background and Results Of Our Workmentioning
confidence: 99%
“…Hence, nothing can be said about the general vulnerability. However, a secure implementation against power-analysis attacks usually leads to a high overhead in the area and power consumption [21] which commonly depends on the number of flip-flops used [29]. Therefore, the resources required for a secure implementation even increase the necessity of developing a stream cipher solutions which require as few flipflops as possible.…”
Section: Security Discussionmentioning
confidence: 99%
“…They have attracted much attention since the beginning of the eSTREAM project in 2004. Although there is vast literature about DPA on implementations of block ciphers and public key algorithms, only few publications can be found about DPA attacks on stream ciphers ( [2], [3], [4], [8], [13], [14]). …”
Section: Introductionmentioning
confidence: 99%
“…It was first reported by Kocher et al in 1998 that the power consumption of a smart card could reveal the secret key of the cryptographic algorithm [1]. DPA is a well-known and thoroughly studied threat for implementations of block ciphers (DES and AES), public key algorithms (RSA) and recently stream ciphers (Grain and Trivium [4]). …”
Section: Introductionmentioning
confidence: 99%