Acta Metallurgica Sinica(English letters) ›› 2011, Vol. 18 ›› Issue (5): 118-123.doi: 10.1016/S1005-8885(10)60113-6

• Others • 上一篇    下一篇

Correlation power analysis of DECIMv2

贾艳艳,胡予濮,赵勇斌,高军涛   

  1. 西安电子科技大学
  • 收稿日期:2011-01-10 修回日期:2011-06-01 出版日期:2011-10-31 发布日期:2011-10-13
  • 通讯作者: 贾艳艳 E-mail:yyjia1983@gmail.com
  • 基金资助:

    This work was supported by the National Basic Research Program of China (2007CB311201), and the National Natural Science Foundation of China (60833008, 60803149).

Correlation power analysis of DECIMv2

  1. Key Laboratory of Computer Networks and Information Security, Xidian University, Xi’an 710071, China
  • Received:2011-01-10 Revised:2011-06-01 Online:2011-10-31 Published:2011-10-13
  • Contact: Yan-Yan JIA E-mail:yyjia1983@gmail.com
  • Supported by:

    This work was supported by the National Basic Research Program of China (2007CB311201), and the National Natural Science Foundation of China (60833008, 60803149).

摘要:

Power analysis has been a powerful and thoroughly studied threat for implementations of block ciphers and public key algorithms but not yet for stream ciphers. Based on the consumed power differences between two neighboring clock cycles, this paper presents a correlation power analysis (CPA) attack on the synchronous stream cipher DECIMv2 (the tweaked version of the original submission DECIM). This attack resynchronizes the cryptographic device ceaselessly with many different initialization values (IVs) to obtain enough power traces. Then by modeling the statistical properties of the differential power traces with the correlation coefficients, the proposed attack algorithm can completely reveal the secret key of DECIMv2. Furthermore, a simulation attack is mounted to confirm the validity of the algorithm. The results show that the entire secret key of DECIMv2 can be restored within several minutes by performing 12 CPA attacks. It seems that there are still some defects in the design of DECIMv2 and thus some further improvements should be made to resist the proposed attack.

关键词:

cryptography, cryptanalysis, side channel attacks (SCA), CPA, DECIMv2

Abstract:

Power analysis has been a powerful and thoroughly studied threat for implementations of block ciphers and public key algorithms but not yet for stream ciphers. Based on the consumed power differences between two neighboring clock cycles, this paper presents a correlation power analysis (CPA) attack on the synchronous stream cipher DECIMv2 (the tweaked version of the original submission DECIM). This attack resynchronizes the cryptographic device ceaselessly with many different initialization values (IVs) to obtain enough power traces. Then by modeling the statistical properties of the differential power traces with the correlation coefficients, the proposed attack algorithm can completely reveal the secret key of DECIMv2. Furthermore, a simulation attack is mounted to confirm the validity of the algorithm. The results show that the entire secret key of DECIMv2 can be restored within several minutes by performing 12 CPA attacks. It seems that there are still some defects in the design of DECIMv2 and thus some further improvements should be made to resist the proposed attack.

Key words:

cryptography, cryptanalysis, side channel attacks (SCA), CPA, DECIMv2

中图分类号: