Lightweight Ciphers and Their Side-Channel Resilience
نویسندگان
چکیده
منابع مشابه
Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, side-channel analysis for lightweight ciphers is much less investigated than for instance for AES. Although intuition may lead to the conclusion that lightweight ciphers are weaker in terms of side-channel resistance, that remains to be confirmed and quantified. In this paper, we consider various...
متن کاملStream Ciphers and Side-Channel Analysis
In this short note we review the state-of-the-art of sidechannel attacks on implementations of stream ciphers. We overview published work. We also survey the most commonly used countermeasures and how they influence the cost and security of an implementation. The recommendations given in this note result from our practical experience with side-channel attacks and countermeasures in general, and...
متن کاملSide-channel Analysis of Lightweight Ciphers: Current Status and Future Directions
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, side-channel analysis for lightweight ciphers is much less investigated than for instance for AES. Although in tuition may lead to the conclusion that lightweight ciphers are weaker in terms of side-channel resistance, that remains to be confirmed and quan tified. In this paper, we consider var...
متن کاملSide Channel Cryptanalysis of Product Ciphers
Building on the work of Kocher [Koc96], we introduce the notion of side-channel cryptanalysis: cryptanalysis using implementation data. We discuss the notion of side-channel attacks and the vulnerabilities they introduce, demonstrate side-channel attacks against three product ciphers—timing attack against IDEA, processor-flag attack against RC5, and Hamming weight attack against DES—and then ge...
متن کاملSide Channel Cube Attacks on Block Ciphers
In this paper we formalize the notion of leakage attacks on iterated block ciphers, in which the attacker can find (via physical probing, power measurement, or any other type of side channel) one bit of information about the intermediate state of the encryption after each round. Since bits computed during the early rounds can be typically represented by low degree multivariate polynomials, cube...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Computers
سال: 2020
ISSN: 0018-9340,1557-9956,2326-3814
DOI: 10.1109/tc.2017.2757921