咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Improved Side Channel Attacks ... 收藏

Improved Side Channel Attacks on TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3 and ASCON-128a

作     者:Sahoo, Soumya Patil, Raghavendra Mondal, Sandip Kumar Sarkar, Santanu Rebeiro, Chester 

作者机构:Indian Inst Technol Madras Dept Math Chennai 600036 Tamil Nadu India Indian Inst Technol Madras Dept Comp Sci & Engn Chennai 600036 Tamil Nadu India 

出 版 物:《DESIGNS CODES AND CRYPTOGRAPHY》 (Des Codes Cryptography)

年 卷 期:2025年第93卷第6期

页      面:1911-1933页

核心收录:

学科分类:07[理学] 0701[理学-数学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 070101[理学-基础数学] 

基  金:Prime Minister's Research Fellowship, Government of India Information Security Education and Awareness (ISEA), initiatives of MeitY 

主  题:Stream Cipher TRIVIUM GRAIN-128-AEAD ACORN-128 v3 ASCON-128a Side Channel Attack Satisfiability Modulo Theory 

摘      要:Side Channel Attacks (SCA) exploit physical information leakage from devices performing cryptographic operations, posing significant security threats. While SCA has been extensively studied in the context of block ciphers, similar analyses on stream ciphers and constructions like authenticated encryption are less explored. In this paper, we present a novel enhancement to existing SCA techniques based on the hamming weight model for stream ciphers. We have identified critical oversights in previous SCA attack models, allowing us to introduce additional inequalities that enhance the model s effectiveness. For TRIVIUM and GRAIN-128-AEAD, we demonstrate that a practical state recovery attack can be achieved in significantly less time than existing attacks on the HW/32 model. Furthermore, we show that our improved model is capable of handling the HW/64 model and can recover the state even with noisy traces within a few hours. Additionally, we extend our model to the authenticated encryption schemes ACORN-128 v3 and ASCON-128a, demonstrating its broader applicability.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分