Power analysis attacks on ARX: An application to Salsa20

Bodhisatwa Mazumdar, Sk Subidh Ali, Ozgur Sinanoglu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we analyze the vulnerability of Salsa20 stream cipher against power analysis attacks, especially against correlation power analysis (CPA), which is the strongest form of power analysis attacks. In recent literature, a rigorous study of optimal differential characteristics is presented, but an analysis of the resistance of the cipher against power analysis side-channel attacks remains absent. Our technique targets the three subrounds of the first round of Salsa20. The overall correlation based differential power analysis (DPA) has an attack complexity of 219. From extensive experiments on a reduced area implementation of Salsa20, we demonstrate that two key words k0, k7 of a block in Salsa20 are extremely vulnerable to CPA while a combination of two key words k2, k4 produced a very low success rate of 0.2, which shows a high resilience against correlation-analysis DPA. This varying resilience of the key words towards correlation-analysis DPA has not been observed in any stream or block cipher in present literature, which makes the architecture of this stream cipher interesting from the side-channel analysis perspective.

Original languageEnglish (US)
Title of host publicationProceedings of the 21st IEEE International On-Line Testing Symposium, IOLTS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages40-43
Number of pages4
ISBN (Electronic)9781467379045
DOIs
StatePublished - Aug 28 2015
Event21st IEEE International On-Line Testing Symposium, IOLTS 2015 - Elia, Halkidiki, Greece
Duration: Jul 6 2015Jul 8 2015

Other

Other21st IEEE International On-Line Testing Symposium, IOLTS 2015
CountryGreece
CityElia, Halkidiki
Period7/6/157/8/15

Fingerprint

Side channel attack
Experiments

Keywords

  • ARX
  • Correlation Analysis DPA
  • Differential Power Analysis
  • Hamming Weight
  • Salsa20
  • Success Rate

ASJC Scopus subject areas

  • Computer Science Applications
  • Software
  • Electrical and Electronic Engineering

Cite this

Mazumdar, B., Ali, S. S., & Sinanoglu, O. (2015). Power analysis attacks on ARX: An application to Salsa20. In Proceedings of the 21st IEEE International On-Line Testing Symposium, IOLTS 2015 (pp. 40-43). [7229828] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IOLTS.2015.7229828

Power analysis attacks on ARX : An application to Salsa20. / Mazumdar, Bodhisatwa; Ali, Sk Subidh; Sinanoglu, Ozgur.

Proceedings of the 21st IEEE International On-Line Testing Symposium, IOLTS 2015. Institute of Electrical and Electronics Engineers Inc., 2015. p. 40-43 7229828.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mazumdar, B, Ali, SS & Sinanoglu, O 2015, Power analysis attacks on ARX: An application to Salsa20. in Proceedings of the 21st IEEE International On-Line Testing Symposium, IOLTS 2015., 7229828, Institute of Electrical and Electronics Engineers Inc., pp. 40-43, 21st IEEE International On-Line Testing Symposium, IOLTS 2015, Elia, Halkidiki, Greece, 7/6/15. https://doi.org/10.1109/IOLTS.2015.7229828
Mazumdar B, Ali SS, Sinanoglu O. Power analysis attacks on ARX: An application to Salsa20. In Proceedings of the 21st IEEE International On-Line Testing Symposium, IOLTS 2015. Institute of Electrical and Electronics Engineers Inc. 2015. p. 40-43. 7229828 https://doi.org/10.1109/IOLTS.2015.7229828
Mazumdar, Bodhisatwa ; Ali, Sk Subidh ; Sinanoglu, Ozgur. / Power analysis attacks on ARX : An application to Salsa20. Proceedings of the 21st IEEE International On-Line Testing Symposium, IOLTS 2015. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 40-43
@inproceedings{e4742c5e995c445e878ddfa35658459d,
title = "Power analysis attacks on ARX: An application to Salsa20",
abstract = "In this paper, we analyze the vulnerability of Salsa20 stream cipher against power analysis attacks, especially against correlation power analysis (CPA), which is the strongest form of power analysis attacks. In recent literature, a rigorous study of optimal differential characteristics is presented, but an analysis of the resistance of the cipher against power analysis side-channel attacks remains absent. Our technique targets the three subrounds of the first round of Salsa20. The overall correlation based differential power analysis (DPA) has an attack complexity of 219. From extensive experiments on a reduced area implementation of Salsa20, we demonstrate that two key words k0, k7 of a block in Salsa20 are extremely vulnerable to CPA while a combination of two key words k2, k4 produced a very low success rate of 0.2, which shows a high resilience against correlation-analysis DPA. This varying resilience of the key words towards correlation-analysis DPA has not been observed in any stream or block cipher in present literature, which makes the architecture of this stream cipher interesting from the side-channel analysis perspective.",
keywords = "ARX, Correlation Analysis DPA, Differential Power Analysis, Hamming Weight, Salsa20, Success Rate",
author = "Bodhisatwa Mazumdar and Ali, {Sk Subidh} and Ozgur Sinanoglu",
year = "2015",
month = "8",
day = "28",
doi = "10.1109/IOLTS.2015.7229828",
language = "English (US)",
pages = "40--43",
booktitle = "Proceedings of the 21st IEEE International On-Line Testing Symposium, IOLTS 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Power analysis attacks on ARX

T2 - An application to Salsa20

AU - Mazumdar, Bodhisatwa

AU - Ali, Sk Subidh

AU - Sinanoglu, Ozgur

PY - 2015/8/28

Y1 - 2015/8/28

N2 - In this paper, we analyze the vulnerability of Salsa20 stream cipher against power analysis attacks, especially against correlation power analysis (CPA), which is the strongest form of power analysis attacks. In recent literature, a rigorous study of optimal differential characteristics is presented, but an analysis of the resistance of the cipher against power analysis side-channel attacks remains absent. Our technique targets the three subrounds of the first round of Salsa20. The overall correlation based differential power analysis (DPA) has an attack complexity of 219. From extensive experiments on a reduced area implementation of Salsa20, we demonstrate that two key words k0, k7 of a block in Salsa20 are extremely vulnerable to CPA while a combination of two key words k2, k4 produced a very low success rate of 0.2, which shows a high resilience against correlation-analysis DPA. This varying resilience of the key words towards correlation-analysis DPA has not been observed in any stream or block cipher in present literature, which makes the architecture of this stream cipher interesting from the side-channel analysis perspective.

AB - In this paper, we analyze the vulnerability of Salsa20 stream cipher against power analysis attacks, especially against correlation power analysis (CPA), which is the strongest form of power analysis attacks. In recent literature, a rigorous study of optimal differential characteristics is presented, but an analysis of the resistance of the cipher against power analysis side-channel attacks remains absent. Our technique targets the three subrounds of the first round of Salsa20. The overall correlation based differential power analysis (DPA) has an attack complexity of 219. From extensive experiments on a reduced area implementation of Salsa20, we demonstrate that two key words k0, k7 of a block in Salsa20 are extremely vulnerable to CPA while a combination of two key words k2, k4 produced a very low success rate of 0.2, which shows a high resilience against correlation-analysis DPA. This varying resilience of the key words towards correlation-analysis DPA has not been observed in any stream or block cipher in present literature, which makes the architecture of this stream cipher interesting from the side-channel analysis perspective.

KW - ARX

KW - Correlation Analysis DPA

KW - Differential Power Analysis

KW - Hamming Weight

KW - Salsa20

KW - Success Rate

UR - http://www.scopus.com/inward/record.url?scp=84955511445&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84955511445&partnerID=8YFLogxK

U2 - 10.1109/IOLTS.2015.7229828

DO - 10.1109/IOLTS.2015.7229828

M3 - Conference contribution

SP - 40

EP - 43

BT - Proceedings of the 21st IEEE International On-Line Testing Symposium, IOLTS 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -