2014
DOI: 10.1007/s11390-014-1456-3
|View full text |Cite
|
Sign up to set email alerts
|

Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…In the most of papers [1,[10][11][12][13][14][15][16][17][18][19] discussing scan-based attacks, it has been assumed that the adversary has physical access to the crypto-chip and knows the used encryption algorithm, but he/she does not have information about the details of the scan chain structure. Accordingly, a successful scan-based attack needs two phases of (i) discovery of the scan chain structure, and (ii) extraction of secret keys.…”
Section: Scan-based Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…In the most of papers [1,[10][11][12][13][14][15][16][17][18][19] discussing scan-based attacks, it has been assumed that the adversary has physical access to the crypto-chip and knows the used encryption algorithm, but he/she does not have information about the details of the scan chain structure. Accordingly, a successful scan-based attack needs two phases of (i) discovery of the scan chain structure, and (ii) extraction of secret keys.…”
Section: Scan-based Attacksmentioning
confidence: 99%
“…By repeating these steps, the adversary will have a set of applied plain texts and a set of scanned out patterns. Analysing these two sets reveals a one-to-one [1,10,13,[15][16][17][18][19], or one-tomany [11,12,14] mapping between the chip primary inputs and cells of the scan chain. It is worthy of note that, this mapping is strictly required in order to do the second phase of a scan-based attack [1,11,21,24].…”
Section: Scan-based Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the feedback in LFSR is given to s 15 register only and all remaining 15 shift registers being clocked with values of previous registers, attack could possibly be made. Many attacks related to LFSR are proposed in [4][5][6][9][10][11] which are scan-based attack, power analysis attack, algebraic attack, fast correlation attack, posing threat to algorithms especially based on producing stream ciphers.Attack related to cache-timing attack [3] is also there which have stream-ciphers as the target. According to it, on all word-based LFSR implementations that use lookup tables to speed up multiplications a full attack can be done making threat to algorithm.…”
Section: Introductionmentioning
confidence: 99%