Skip to main content

LFSR Based Stream Ciphers Are Vulnerable to Power Attacks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4859))

Abstract

Linear Feedback Shift Registers (LFSRs) are used as building blocks for many stream ciphers, wherein, an n-degree primitive connection polynomial is used as a feedback function to realize an n-bit LFSR. This paper shows that such LFSRs are susceptible to power analysis based Side Channel Attacks (SCA). The major contribution of this paper is the observation that the state of an n-bit LFSR can be determined by making O(n) power measurements. Interestingly, neither the primitive polynomial nor the value of n be known to the adversary launching the proposed attack. The paper also proposes a simple countermeasure for the SCA that uses n additional flipflops.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kocher, P., Lee, R., McGraw, G., Raghunathan, A., Ravi, S.: Security as a New Dimension in Embedded System Design. In: Proc. of IEEE Design Automation Conference - DAC 2004, pp. 753–761. IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  2. Kumar, S., Lemke, K., Paar, C.: Some Thoughts about Implementation Properties of Stream Ciphers. In: Proc. of State of the Art of Stream Ciphers Workshop - SASC 2004, Brugge, Belgium (2004)

    Google Scholar 

  3. Rechberger, C., Oswald, E.: Stream Ciphers and Side-Channel Analysis. In: Proc. of State of the Art of Stream Ciphers Workshop - SASC 2004, Brugge, Belgium (2004)

    Google Scholar 

  4. Delaunay, P., Joux, A.: Galois LFSR, Embedded Devices and Side Channel Weaknesses. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 436–451. Springer, Heidelberg (2006)

    Google Scholar 

  5. Shamir, A.: A Top View of Side Channel Attacks. In: Proc. of L-SEC/CALIT IT Security Congress (October 19-20, 2006)

    Google Scholar 

  6. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  7. Golomb, S.: Shift Register Sequences. Aegean Park Press, Laguna Hills, CA (1981)

    Google Scholar 

  8. Bedi, S.S., Pillai, N.R.: Cryptanalysis Of The Nonlinear Feedforward Generator. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 188–194. Springer, Heidelberg (2000)

    Google Scholar 

  9. Hsiao, M.S.: Peak Power Estimation using Genetic Spot Optimization for large VLSI circuits. In: DATE 1999. Proc. of Intl. Conf. on Design Automation and Test in Europe, pp. 175–179 (1999)

    Google Scholar 

  10. Menezes, A., van Oorschot, P., Van stone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1996)

    Google Scholar 

  11. Davies, A.C.: Delayed versions of maximal-length linear binary sequences. Electronic Letters 1, 61 (1965)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

K. Srinathan C. Pandu Rangan Moti Yung

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Burman, S., Mukhopadhyay, D., Veezhinathan, K. (2007). LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. In: Srinathan, K., Rangan, C.P., Yung, M. (eds) Progress in Cryptology – INDOCRYPT 2007. INDOCRYPT 2007. Lecture Notes in Computer Science, vol 4859. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77026-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77026-8_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77025-1

  • Online ISBN: 978-3-540-77026-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics