Skip to main content

Leakage Squeezing Using Cellular Automata

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8155))

Abstract

Leakage squeezing is a novel approach towards resisting side channel attacks against cryptographic implementations. It is seen that certain codes are ideal for leakage squeezing applications. However, in this paper we argue that few other cryptographic properties are essential for better squeezing. In this respect we analyze few Cellular Automata (CA) configurations towards suitability in leakage squeezing. It is argued that nonlinear cellular automata with respective cryptographic and code properties are ideal for applications in this scenario.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carlet, C., Danger, J.-L., Guilley, S., Maghrebi, H.: Leakage squeezing of order two. Cryptology ePrint Archive, Report 2012/567 (2012), http://eprint.iacr.org/

  2. Filiol, E.: A new statistical testing for symmetric ciphers and hash functions. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 342–353. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Gutowitz, H.: Cellular automata: Theory and experiment (1991)

    Google Scholar 

  4. Saarinen, M.J.O.: Chosen-iv statistical attacks on e-stream stream ciphers. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/013, pp. 5–19 (2006)

    Google Scholar 

  5. Karmakar, S., Mukhopadhyay, D., Roy Chowdhury, D.: d-monomial Tests on Cellular Automata for Cryptographic Design. In: Bandini, S., Manzoni, S., Umeo, H., Vizzari, G. (eds.) ACRI 2010. LNCS, vol. 6350, pp. 261–270. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Maghrebi, H., Guilley, S., Danger, J.-L.: Leakage squeezing countermeasure against high-order attacks. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 208–223. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  7. Martin, B., Sole, P.: Pseudo-random sequences generated by cellular automata. In: International Conference on Relations, Orders and Graphs: Interactions with Computer Science (2008)

    Google Scholar 

  8. Martin, B., Sole, P., Lacharme, P.: Pseudo-random sequences, boolean functions and cellular automata. Boolean Functions: Cryptography and Applications (2007)

    Google Scholar 

  9. Roy Chowdhury, D., Nandi, S., Chattopadhyay, S., Pal Chaudhuri, P.: Additive cellular automata - theory and applications (1997)

    Google Scholar 

  10. Wolfram, S.: Random sequence generation by cellular automata. In: Advances in Applied Mathematics, vol. 7, pp. 123–169 (1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karmakar, S., Roy Chowdhury, D. (2013). Leakage Squeezing Using Cellular Automata. In: Kari, J., Kutrib, M., Malcher, A. (eds) Cellular Automata and Discrete Complex Systems. AUTOMATA 2013. Lecture Notes in Computer Science, vol 8155. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40867-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40867-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40866-3

  • Online ISBN: 978-3-642-40867-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics