2015
DOI: 10.1007/978-3-319-21476-4_4
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks

Abstract: This paper compares attack outcomes w.r.t. profiled single trace attacks of four different lightweight ciphers in order to investigate which of their properties, if any, contribute to attack success. We show that mainly the diffusion properties of both the round function and the key schedule play a role. In particular, the more (reasonably statistically independent) intermediate values are produced in a target implementation, the better attacks succeed. A crucial aspect for lightweight ciphers is hence the key… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Nonlinearity (NL) of the components of the modular addition (selection functions ϕ4 and ϕ5 from Table 2). By nonlinearity of a component of an (n, m) function F , we mean the nonlinearity of F computed for a fixed vector v ∈ F m * 2 as in Equation (1). "Number" denotes how many components have the given nonlinearity NL, "Proportion (%)" is the proportion of the given nonlinearity NL with respect to the nonlinearity of all components of F .…”
Section: Selection Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…Nonlinearity (NL) of the components of the modular addition (selection functions ϕ4 and ϕ5 from Table 2). By nonlinearity of a component of an (n, m) function F , we mean the nonlinearity of F computed for a fixed vector v ∈ F m * 2 as in Equation (1). "Number" denotes how many components have the given nonlinearity NL, "Proportion (%)" is the proportion of the given nonlinearity NL with respect to the nonlinearity of all components of F .…”
Section: Selection Functionmentioning
confidence: 99%
“…In particular, the study of the SCA-resistance of software implementations of lightweight ciphers did not keep pace with the high number of new proposals. In [1], the resilience of the AES and three lightweight block ciphers that share some characteristics (namely KLEIN, LED, and PRESENT) is investigated against profiled singletrace attacks. Unprotected hardware implementations of Simon and LED were analyzed with respect to DPA in [34].…”
Section: Introductionmentioning
confidence: 99%
“…Several works have already examined the strength of lightweight ciphers against SCA and highlighted some of their exciting features. Banciu et al [BOW15] investigate three ciphers (PRESENT, LED and KLEIN) and compare them to AES using pragmatic simple power analysis [Man03] (essentially key enumeration exploiting leakage from a single trace). They notice that the lighter diffusion in the round function and especially the key schedule leads to more powerful attacks, as it leads to more intermediate variables whose leakage can be effectively exploited in a key enumeration effort.…”
Section: Related Workmentioning
confidence: 99%