Abstract

Correlation power analysis (CPA) is a powerful kind of power analysis attacks that is able to break ciphers using correlation between power consumption of the device and hamming weight of the key-dependent values of the algorithm. This paper describes a successful CPA attack against FPGA implementation of KASUMI, a block cipher used in the confidentiality and integrity algorithms of the 3rd generation partnership program (3GPP) mobile communications which is also very suitable for hardware implementation. The main contribution of this paper is that it presents a simulation-based CPA attack which does not need any experimental setup and leads to considerable saving in time and cost. To the best of our knowledge, there are a few articles that present simulation-based power analysis of block ciphers in detail, and specifically, there is no report about mounting of simulation-based or non-simulation-based power analysis attack against hardware implementation of KASUMI in the open literature.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call