Abstract

In this paper, we demonstrate a new Differential Power Analysis (DPA) attack technique against Grain v1 stream cipher by resynchronizing the cipher multiple times with the same value of the secret key and different initialization vectors (IVs). Our proposed attack strategy requires less than a hundred randomly generated IVs (expected value) to retrieve the whole 80bit key. Further, the power trace classifications of Grain v1 cipher implemented on SASEBO G-II standard side channel evaluation board is shown in order to validate our proposed DPA attack against the cipher. The captured power traces were analyzed using Least Squares Support Vector Machine (LS-SVM) learning algorithm based multiclass classifiers to classify the power traces into the respective Hamming distance (HD) classes. To extract power samples with high information about HD classes, Signal-to-noise ratio (SNR) metric was chosen for feature selection. The experiment of power trace classifications of test set showed a high success rate of 98% when the five largest SNR sample instants over a clock cycle were chosen as features.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.