# Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks

@inproceedings{Banciu2015ExploringTR, title={Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks}, author={Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall}, booktitle={COSADE}, year={2015} }

This paper compares attack outcomes w.r.t. profiled single trace attacks of four different lightweight ciphers in order to investigate which of their properties, if any, contribute to attack success. We show that mainly the diffusion properties of both the round function and the key schedule play a role. In particular, the more reasonably statistically independent intermediate values are produced in a target implementation, the better attacks succeed. A crucial aspect for lightweight ciphers is…

## 3 Citations

Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice

- Computer Science, MathematicsACNS
- 2016

This paper attacks implementations of the lightweight block ciphers AES, Fantomas, LBlock, Piccolo, PRINCE, RC5, Simon, and Speck on an 8-bit AVR processor and explores the relation between the nonlinearity of the studied selection functions and the measured leakages.

A Simple Power Analysis Attack on ARIA Key Expansion Based on Hamming Weight Leakage

- Computer Science, MathematicsInscrypt 2015
- 2015

It is shown that ARIA is vulnerable to a SPA attack based on hamming weight leakage and the presented attack efficiently utilizes this information leakage to substantially reduce the key space that needs to be considered in a brute-force search for the secret key.

Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers

- Computer Science, MathematicsIEEE Transactions on Emerging Topics in Computing
- 2017

This paper presents a generalized timing attack methodology, which is applicable to both Substitution Permutation Network (SPN) as well as Feistel block ciphers and proposes a cost-effective countermeasure which eliminates the input-dependent timing variation and thwarts all such timing attacks on BDD based implementations of NEMS relay design.

## References

SHOWING 1-10 OF 21 REFERENCES

The LED Block Cipher

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2012

This work considers the resistance of ciphers, and LED in particular, to related-key attacks, and is able to derive simple yet interesting AES-like security proofs for LED regarding related- or single- key attacks.

Simple Power Analysis on AES Key Expansion Revisited

- Mathematics, Computer ScienceCHES
- 2014

A constructive method is devised that answers the open question whether two different ciphering keys may be undistinguishable in the sense that they have exactly the same set of expanded key bytes Hamming weights by devising a constructive method that exhibits many examples of such ambiguous observations.

Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA

- Computer Science, MathematicsCHES
- 2009

It is shown experimentally that most of the intuitions that hold for PRESENT can also be observed for an unprotected implementation of Rijndael in an 8-bit controller and exhibit that algebraic techniques lead to a new understanding of implementation weaknesses that is different than classical side-channel attacks.

Representation-, Leakage- and Cipher-Dependencies in Algebric Sidde-Channel Attacks

- Computer Science, MathematicsACNS 2010
- 2010

The efficiency of different representations of the side-channel information as low degree boolean equations as well as the impact of different types of information leakages on the attack resolution times are investigated.

Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search

- Computer Science, MathematicsSEC
- 2005

An SPA power attack on an 8-bit implementation of AES that uses an optimized search of the key space to improve upon previous work in terms of speed, flexibility, and handling of data error.

A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion

- Computer Science, MathematicsICISC
- 2002

This article presents a simple power-analysis (SPA) attack on implementations of the AES key expansion that efficiently utilizes information leakage to substantially reduce the key space that needs to be considered in a brute-force search for the secret key.

Algebraic Side-Channel Attacks

- Computer Science, MathematicsInscrypt
- 2009

It is argued that algebraic side- channel attacks can take advantage of any kind of physical leakage, leading to a new tradeoff between the robustness and informativeness of the side-channel information extraction.

Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES

- Computer Science, MathematicsCOSADE
- 2014

It is concluded that the pragmatic enumeration technique better copes with erroneous information which makes it more interesting in practice.

Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations

- Computer Science, MathematicsIEEE Transactions on Information Forensics and Security
- 2014

This paper proposes a new analytical side-channel attack on AES by exploiting the incomplete diffusion feature in one AES round, which has less time complexity and more robustness than previous ASCAs, and adopts a specialized approach to recover the secret key of AES instead of the general solver.

Tolerant Algebraic Side-Channel Analysis of AES

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2012

We report on a Tolerant Algebraic Side-Channel Analysis (TASCA) attack on an AES implementation, using an optimizing pseudoBoolean solver to recover the secret key from a vector of Hamming weights…