An architectural countermeasure against power analysis attacks for FSR-based stream ciphers
2012 (English)In: Lect. Notes Comput. Sci., 2012, 54-68 p.Conference paper (Refereed)
Feedback Shift Register (FSR) based stream ciphers are known to be vulnerable to power analysis attacks due to their simple hardware structure. In this paper, we propose a countermeasure against non-invasive power analysis attacks based on switching activity masking. Our solution has a 50% smaller power overhead on average compared to the previous standard cell-based countermeasures. Its resistance against different types of attacks is evaluated on the example of Grain-80 stream cipher.
Place, publisher, year, edition, pages
2012. 54-68 p.
, Lecture Notes in Computer Science, ISSN 0302-9743 ; 7275
Cell-based, Feedback shift register, Hardware structures, Power analysis attack, Power overhead, Stream Ciphers, Switching activities, Cryptography, Electric batteries, Shift registers, Computer hardware description languages
Computer and Information Science
IdentifiersURN: urn:nbn:se:kth:diva-128700DOI: 10.1007/978-3-642-29912-4_5ScopusID: 2-s2.0-84862136077ISBN: 9783642299117OAI: oai:DiVA.org:kth-128700DiVA: diva2:652349
3rd International Workshop, Constructive Side-Channel Analysis and Secure Design, COSADE 2012, 3 May 2012 through 4 May 2012, Darmstadt
QC 201309302013-09-302013-09-162013-09-30Bibliographically approved