ABSTRACT
Recently, there has been extensive research on mobile devices and stream cipher to increase security. The Rabbit stream cipher was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithms of the ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization. As the Rabbit evaluated the complexity of side-channel analysis attack as 'medium' in a theoretical approach, the method of correlation power analysis attack and the feasibility of a practical power analysis attack in the experiments are described in this paper. We also propose a countermeasure with random masking and hiding schemes for linear operation. We construct the algorithm of the countermeasure with an additional operating time of 24% with 12.3% increased memory requirements to maintain high-speed performance. We use an eight-bit RISC AVR microprocessor (ATmega 128L) to implement our methods to show that the proposed method is secure against correlation power analysis attacks in practical experiments.
- R. Tahir, M. Y. Javed, A. Ahmad and R. Iqbal, "SCUR : Secure Communications in Wireless Sensor Networks using Rabbit," In Proceedings of World Congress on Engineering 2008 - WCE 2008, vol 1, pp. 518--522, 2008.Google Scholar
- Y. Chen, and W. S. Ku, "Selft-Encryption Scheme for Data Security in Mobile Devices, " In CCNC 2009, 6th IEEE, pp. 1--5, Jan. 2009. Google ScholarDigital Library
- P. Gasti, and Y. Chen, "Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices," In 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, pp. 624--630, 2010. Google ScholarDigital Library
- P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," In CRYPTO 1999, LNCS 1666, Springer-Verlag, pp. 388--397, 1999. Google ScholarDigital Library
- W. Fischer, B. M. Gammel, O. Kniffler and J. Velten, "Differential Power Analysis of Stream Ciphers", Topics in Cryptology - CT-RSA 2007, LNCS 4377, Spriger-Verlag, pp. 257--270, 2007. Google ScholarDigital Library
- K. Wu, H. Li, B. Peng, and F. Yu, "Correlation Power Analysis Attack against Synchronous Stream Ciphers," In ICYCS 2008, pp. 2067--2072, 2008. Google ScholarDigital Library
- M. Boesgaard, T. Pedersen, M. Vesterager, and E. Zenner. "The Rabbit Stream Cipher - Design and Security Analysis," In SASC 2004, pp. 7--29, 2004.Google Scholar
- The eSTREAM Project, http://www.ecrypt.eu.org/streamGoogle Scholar
- ISO/IEC 18033-4, "Amendment 1 - Information technology - security techniques - Encryption algorithms - Part 4: Stream ciphers," JTC 1/SC 27 (IT security tech.) http://www.iso.org, 2009.Google Scholar
- Benedikt Gierlichs et al., "Susceptible of eSTREAM Candidates towards Side Channel Analysis," In SASC 2008 - Candidate of the Art of Stream Ciphers, pp. 123--150, 2008.Google Scholar
- The eSTREAM phase 2 page of Rabbit, http://www.ecrypt.eu.org/stream/rabbitp2.htmlGoogle Scholar
- A Description of the Rabbit Stream Cipher Algorithm, Request for Comments : 4503, http://www.ietf.org/rfc/rfc4503.txt?number=4503Google Scholar
- S. Tillich and C. Herbert, "Attacking State-of-the-Art Software Countermeasures - A Case Study for AES," In CHES 2008, LNCS 5154, Springer-Verlag, pp. 228--243, 2008. Google ScholarDigital Library
- M. Rivain and E. Prouff, "Provably Secure Higher-Order Masking of AES," In CHES 2010, LNCS 6225, Springer-Verlag, pp. 413--427, 2010. Google ScholarDigital Library
- M. Rivain, E. Prouff, and J. Doget, "Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers," In CHES 2009, LNCS 5747, Springer-Verlag, pp. 171--188, 2009. Google ScholarDigital Library
- Ilya Mironov, "(Not So) Random Shuffles of RC4," In CRYPTO 2002, LNCS 2442, Springer-Verlag, pp. 304--319, 2002. Google ScholarDigital Library
Index Terms
- Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)
Recommendations
Power Analysis Attacks and Countermeasures
One of the biggest challenges of designers of cryptographic devices is to protect the devices against implementation attacks. Power analysis attacks are among the strongest of these attacks. This article provides an overview of power analysis attacks ...
QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks
Side channel analysis attacks employ the emanated side channel information to deduce the secret keys from cryptographic implementations by analyzing the power traces during execution or scrutinizing faulty outputs. To be effective, a countermeasure must ...
FPGA Based Countermeasures against Side Channel Attacks on Block Ciphers
ASPDAC '23: Proceedings of the 28th Asia and South Pacific Design Automation ConferenceField Programmable Gate Arrays (FPGAs) are increasingly ubiquitous. FPGAs enable hardware acceleration and reconfigurability. Any security breach or attack on critical computations occurring on an FPGA can lead to devastating consequences. Side-channel ...
Comments