Improved Side Channel Cube Attacks on PRESENT

@article{Zhao2011ImprovedSC,
  title={Improved Side Channel Cube Attacks on PRESENT},
  author={Xin-jie Zhao and Tao Wang and Shize Guo},
  journal={IACR Cryptology ePrint Archive},
  year={2011},
  volume={2011},
  pages={165}
}
The paper presents several improved side channel cube attacks on PRESENT based on single bit leakage model. Compared with the previous study of Yang et al in CANS 2009 [30], based on the same model of single bit leakage in the 3 round, we show that: if the PRESENT cipher structure is unknown, for the leakage bit 0, 32-bit key can be recovered within 2 chosen plaintexts; if the cipher structure is known, for the leakage bit 4,8,12, 48-bit key can be extracted by 2 chosen plaintexts, which is… CONTINUE READING
6 Citations
33 References
Similar Papers

Similar Papers

Loading similar papers…