Side-Channel Analysis of the K2 Stream Cipher
نویسندگان
چکیده
In this paper we provide the first side-channel analysis of the K2 stream cipher. K2 is a fast and secure stream cipher built upon the strengths of SNOW 2.0. We apply timing attacks, power analysis, and differential fault analysis to K2. We show that naively implemented K2 is vulnerable to cache-timing attacks, and describe how to implement efficient countermeasures to protect K2 against side-channel attacks in hardware and software.
منابع مشابه
Stream Ciphers and Side-Channel Analysis
In this short note we review the state-of-the-art of sidechannel attacks on implementations of stream ciphers. We overview published work. We also survey the most commonly used countermeasures and how they influence the cost and security of an implementation. The recommendations given in this note result from our practical experience with side-channel attacks and countermeasures in general, and...
متن کاملDifferential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream ciphers. The few existing references mainly treat timing [8] and template attacks [10], or provide a theoretical analysis [6], [7] of weaknesses of stream cipher constructions. In this paper we present attacks on two focus ...
متن کاملHardware Bit-Mixers
A new concept, the Bit-Mixer is introduced. It is a function of fixed, possibly different size of input and output, which computes statistically uncorrelated output from correlated input values, and its behavior is altered by parameters, called keys. Several constructions are presented, with very fast, power efficient implementations in electronic hardware, having very little side channel leaka...
متن کاملYet Another Attack on Vest
We present a new side-channel attack against VEST, a set of four stream ciphers which reached the second phase of the eSTREAM project (the European stream cipher project). The proposed attacks target the counter part of the ciphers, composed of 16 short-length nonlinear feedback shift registers (NLFSR) independently updated. Our aim is to retrieve the whole initial state of the counter (163 to ...
متن کاملCascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher
Jump registers were recently proposed [SASC04] as building blocks for stream ciphers. In this paper a construction based on these principles is described. The proposed encryption primitive is a synchronous stream cipher accommodating a key of 128 bits and an IV of 64 up to 162 bits, or an 80-bit key and 32 to 108 bit IV. Version 3 comes as a final submission for the second phase of the eSTREAM ...
متن کامل