Abstract
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream ciphers. The few existing references mainly treat timing [8] and template attacks [10], or provide a theoretical analysis [6], [7] of weaknesses of stream cipher constructions. In this paper we present attacks on two focus candidates, Trivium and Grain, of the eSTREAM stream cipher project. The attacks exploit the resynchronization phase of ciphers. A novel concept for choosing initial value vectors is introduced, which totally eliminates the algorithmic noise of the device, leaving only the pure side-channel signal. This attack allows to recover the secret key with a small number of samples and without building templates. To prove the concept we apply the attack to hardware implementations of the ciphers. For both stream ciphers we are able to reveal the complete key.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
De Cannière, Ch., Preneel, B.: Trivium Specifications (2005), Available at: http://www.ecrypt.eu.org/stream/p2ciphers/trivium/trivium_p2.pdf
Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003)
Hell, M., Johansson, T., Meier, W.: Grain – A Stream Cipher for Constrained Environments (2006), Available at: http://www.ecrypt.eu.org/stream/p2ciphers/grain/Grain_p2.pdf
Hoch, J., Shamir, A.: Fault Analysis of Stream Ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 240–253. Springer, Heidelberg (2004)
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Kumar, S., Lemke, K., Paar, Ch.: Some Thoughts about Implementation Properties of Stream Ciphers. In: SASC 2004 – The State of the Art of Stream Ciphers, Brugge, Belgium, Workshop Record, October 14-15, 2004, pp. 311–319 (2004), Available at: http://www.ecrypt.eu.org/stvl/sasc/record.html
Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism. In: SASC 2004 – The State of the Art of Stream Ciphers, Brugge, Belgium, Workshop Record, October 14-15, 2004, pp. 327–333 (2004), Available at: http://www.ecrypt.eu.org/stvl/sasc/record.html
Lano, J., Peeters, G.: Cryptanalyse van NESSIE kandidaten (Dutch), Master’s thesis, K. U. Leuven (May 2002)
Rechberger, Ch.: Side Channel Analysis of Stream Ciphers. Master’s thesis, Institute for Applied Information Processing and Communications (IAIK), Graz University (2004)
Rechberger, Ch., Oswald, E.: Stream Ciphers and Side-Channel Analysis. In: SASC 2004 – The State of the Art of Stream Ciphers, Brugge, Belgium, Workshop Record, October 14-15, 2004, pp. 320–326 (2004), Available at: http://www.ecrypt.eu.org/stvl/sasc/record.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fischer, W., Gammel, B.M., Kniffler, O., Velten, J. (2006). Differential Power Analysis of Stream Ciphers. In: Abe, M. (eds) Topics in Cryptology – CT-RSA 2007. CT-RSA 2007. Lecture Notes in Computer Science, vol 4377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11967668_17
Download citation
DOI: https://doi.org/10.1007/11967668_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69327-7
Online ISBN: 978-3-540-69328-4
eBook Packages: Computer ScienceComputer Science (R0)