Abstract
Feedback Shift Register (FSR) based stream ciphers are known to be vulnerable to power analysis attacks due to their simple hardware structure. In this paper, we propose a countermeasure against non-invasive power analysis attacks based on switching activity masking. Our solution has a 50% smaller power overhead on average compared to the previous standard cell-based countermeasures. Its resistance against different types of attacks is evaluated on the example of Grain-80 stream cipher.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Robshaw, M.: The eSTREAM Project. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 1–6. Springer, Heidelberg (2008)
De Cannière, C., Preneel, B.: Trivium. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 244–266. Springer, Heidelberg (2008)
Hell, M., Johansson, T., Maximov, A., Meier, W.: The Grain Family of Stream Ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 179–190. Springer, Heidelberg (2008)
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer-Verlag New York, Inc. (2007)
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Batina, L., Gierlichs, B., Prouff, E., et al.: Mutual information analysis: Comprehensive study. J. Cryptol. 24, 269–291 (2011)
Tokunaga, C., Blaauw, D.: Secure AES engine with a local switched-capacitor current equalizer. In: IEEE International Solid-State Circuits Conference - Digest of Technical Papers, ISSCC 2009 (2009)
Burman, S., Mukhopadhyay, D., Veezhinathan, K.: LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 384–392. Springer, Heidelberg (2007)
Ratanpal, G., Williams, R., Blalock, T.: An on-chip signal suppression countermeasure to power analysis attacks. IEEE Transactions on Dependable and Secure Computing, 179–189 (2004)
Mansouri, S.S., Dubrova, E.: A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers. In: ACM Great Lakes Symposium on VLSI, pp. 235–240 (2011)
Atani, S., Atani, R.E., Mirzakuchaki, S., et al.: On DPA-resistive implementation of fsr-based stream ciphers using sabl logic styles. International Journal of Computers, Communications & Control (2008)
Bucci, M., Giancane, L., Luzzi, R., Trifiletti, A.: Three-Phase Dual-Rail Pre-charge Logic. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 232–241. Springer, Heidelberg (2006)
Moradi, A., Khatir, M., Salmasizadeh, M., et al.: Charge recovery logic as a side channel attack countermeasure. In: ISQED 2009 (2009)
Hell, M., Johansson, T., Maximov, A., et al.: A Stream Cipher Proposal: Grain-128. In: 2006 IEEE International Symposium on Information Theory, pp. 1614–1618 (2006)
Skorobogatov, S.P.: Semi-invasive attacks – a new approach to hardware security analysis. University of Cambridge, Computer Laboratory, Tech. Rep. UCAM-CL-TR-630 (April 2005)
Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis - A Generic Side-Channel Distinguisher. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426–442. Springer, Heidelberg (2008)
Anderson, R., Bond, M., et al.: Cryptographic processors-a survey. Proceedings of the IEEE 94, 357–369 (2006)
Sadeghi, A.-R., Naccache, D.: Towards Hardware-Intrinsic Security: Foundations and Practice, 1st edn. Springer-Verlag New York, Inc. (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mansouri, S.S., Dubrova, E. (2012). An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers. In: Schindler, W., Huss, S.A. (eds) Constructive Side-Channel Analysis and Secure Design. COSADE 2012. Lecture Notes in Computer Science, vol 7275. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29912-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-29912-4_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29911-7
Online ISBN: 978-3-642-29912-4
eBook Packages: Computer ScienceComputer Science (R0)