Differential Power Analysis of Stream Ciphers

  • Conference paper
Topics in Cryptology – CT-RSA 2007 (CT-RSA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4377))

Included in the following conference series:

Abstract

Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream ciphers. The few existing references mainly treat timing [8] and template attacks [10], or provide a theoretical analysis [6], [7] of weaknesses of stream cipher constructions. In this paper we present attacks on two focus candidates, Trivium and Grain, of the eSTREAM stream cipher project. The attacks exploit the resynchronization phase of ciphers. A novel concept for choosing initial value vectors is introduced, which totally eliminates the algorithmic noise of the device, leaving only the pure side-channel signal. This attack allows to recover the secret key with a small number of samples and without building templates. To prove the concept we apply the attack to hardware implementations of the ciphers. For both stream ciphers we are able to reveal the complete key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 42.79
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 53.49
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. De Cannière, Ch., Preneel, B.: Trivium Specifications (2005), Available at: http://www.ecrypt.eu.org/stream/p2ciphers/trivium/trivium_p2.pdf

  2. Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Hell, M., Johansson, T., Meier, W.: Grain – A Stream Cipher for Constrained Environments (2006), Available at: http://www.ecrypt.eu.org/stream/p2ciphers/grain/Grain_p2.pdf

  4. Hoch, J., Shamir, A.: Fault Analysis of Stream Ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 240–253. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  6. Kumar, S., Lemke, K., Paar, Ch.: Some Thoughts about Implementation Properties of Stream Ciphers. In: SASC 2004 – The State of the Art of Stream Ciphers, Brugge, Belgium, Workshop Record, October 14-15, 2004, pp. 311–319 (2004), Available at: http://www.ecrypt.eu.org/stvl/sasc/record.html

  7. Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism. In: SASC 2004 – The State of the Art of Stream Ciphers, Brugge, Belgium, Workshop Record, October 14-15, 2004, pp. 327–333 (2004), Available at: http://www.ecrypt.eu.org/stvl/sasc/record.html

  8. Lano, J., Peeters, G.: Cryptanalyse van NESSIE kandidaten (Dutch), Master’s thesis, K. U. Leuven (May 2002)

    Google Scholar 

  9. Rechberger, Ch.: Side Channel Analysis of Stream Ciphers. Master’s thesis, Institute for Applied Information Processing and Communications (IAIK), Graz University (2004)

    Google Scholar 

  10. Rechberger, Ch., Oswald, E.: Stream Ciphers and Side-Channel Analysis. In: SASC 2004 – The State of the Art of Stream Ciphers, Brugge, Belgium, Workshop Record, October 14-15, 2004, pp. 320–326 (2004), Available at: http://www.ecrypt.eu.org/stvl/sasc/record.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fischer, W., Gammel, B.M., Kniffler, O., Velten, J. (2006). Differential Power Analysis of Stream Ciphers. In: Abe, M. (eds) Topics in Cryptology – CT-RSA 2007. CT-RSA 2007. Lecture Notes in Computer Science, vol 4377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11967668_17

Download citation

  • DOI: https://doi.org/10.1007/11967668_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69327-7

  • Online ISBN: 978-3-540-69328-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation