TY - GEN
T1 - Power analysis attacks on ARX
T2 - 21st IEEE International On-Line Testing Symposium, IOLTS 2015
AU - Mazumdar, Bodhisatwa
AU - Ali, Sk Subidh
AU - Sinanoglu, Ozgur
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/8/28
Y1 - 2015/8/28
N2 - In this paper, we analyze the vulnerability of Salsa20 stream cipher against power analysis attacks, especially against correlation power analysis (CPA), which is the strongest form of power analysis attacks. In recent literature, a rigorous study of optimal differential characteristics is presented, but an analysis of the resistance of the cipher against power analysis side-channel attacks remains absent. Our technique targets the three subrounds of the first round of Salsa20. The overall correlation based differential power analysis (DPA) has an attack complexity of 219. From extensive experiments on a reduced area implementation of Salsa20, we demonstrate that two key words k0, k7 of a block in Salsa20 are extremely vulnerable to CPA while a combination of two key words k2, k4 produced a very low success rate of 0.2, which shows a high resilience against correlation-analysis DPA. This varying resilience of the key words towards correlation-analysis DPA has not been observed in any stream or block cipher in present literature, which makes the architecture of this stream cipher interesting from the side-channel analysis perspective.
AB - In this paper, we analyze the vulnerability of Salsa20 stream cipher against power analysis attacks, especially against correlation power analysis (CPA), which is the strongest form of power analysis attacks. In recent literature, a rigorous study of optimal differential characteristics is presented, but an analysis of the resistance of the cipher against power analysis side-channel attacks remains absent. Our technique targets the three subrounds of the first round of Salsa20. The overall correlation based differential power analysis (DPA) has an attack complexity of 219. From extensive experiments on a reduced area implementation of Salsa20, we demonstrate that two key words k0, k7 of a block in Salsa20 are extremely vulnerable to CPA while a combination of two key words k2, k4 produced a very low success rate of 0.2, which shows a high resilience against correlation-analysis DPA. This varying resilience of the key words towards correlation-analysis DPA has not been observed in any stream or block cipher in present literature, which makes the architecture of this stream cipher interesting from the side-channel analysis perspective.
KW - ARX
KW - Correlation Analysis DPA
KW - Differential Power Analysis
KW - Hamming Weight
KW - Salsa20
KW - Success Rate
UR - http://www.scopus.com/inward/record.url?scp=84955511445&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84955511445&partnerID=8YFLogxK
U2 - 10.1109/IOLTS.2015.7229828
DO - 10.1109/IOLTS.2015.7229828
M3 - Conference contribution
AN - SCOPUS:84955511445
T3 - Proceedings of the 21st IEEE International On-Line Testing Symposium, IOLTS 2015
SP - 40
EP - 43
BT - Proceedings of the 21st IEEE International On-Line Testing Symposium, IOLTS 2015
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 6 July 2015 through 8 July 2015
ER -