Applicability of simple power analysis to stream ciphers constructed using multiple LFSRs

In recent years, the hardware implementation of stream ciphers has attracted the interest of many designers, mainly due to their low implementation area on a chip. However, to date, in comparison with block ciphers, side channel attacks have not been extensively analyzed for their applicability to s...

Full description

Saved in:
Bibliographic Details
Published in2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) pp. 1 - 6
Main Authors Zadeh, A. A., Heys, H. M.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.04.2012
Subjects
Online AccessGet full text
ISBN1467314315
9781467314312
ISSN0840-7789
DOI10.1109/CCECE.2012.6334887

Cover

Loading…
Abstract In recent years, the hardware implementation of stream ciphers has attracted the interest of many designers, mainly due to their low implementation area on a chip. However, to date, in comparison with block ciphers, side channel attacks have not been extensively analyzed for their applicability to stream cipher hardware implementations. However it has been shown that simple power analysis (SPA) attacks are applicable to stream ciphers based on one linear feedback shift register. In this paper, we extend the SPA method to stream ciphers with multiple linear feedback shift registers and multiple linear feedback shift registers with irregular clocking. Then we apply the proposed method to the well-known stream ciphers E0 and LILI-128.
AbstractList In recent years, the hardware implementation of stream ciphers has attracted the interest of many designers, mainly due to their low implementation area on a chip. However, to date, in comparison with block ciphers, side channel attacks have not been extensively analyzed for their applicability to stream cipher hardware implementations. However it has been shown that simple power analysis (SPA) attacks are applicable to stream ciphers based on one linear feedback shift register. In this paper, we extend the SPA method to stream ciphers with multiple linear feedback shift registers and multiple linear feedback shift registers with irregular clocking. Then we apply the proposed method to the well-known stream ciphers E0 and LILI-128.
Author Zadeh, A. A.
Heys, H. M.
Author_xml – sequence: 1
  givenname: A. A.
  surname: Zadeh
  fullname: Zadeh, A. A.
  email: a.zadeh@mun.ca
  organization: Electr. & Comput. Eng., Memorial Univ. of Newfoundland, St. John's, NL, Canada
– sequence: 2
  givenname: H. M.
  surname: Heys
  fullname: Heys, H. M.
  email: hheys@mun.ca
  organization: Electr. & Comput. Eng., Memorial Univ. of Newfoundland, St. John's, NL, Canada
BookMark eNo1kNtKAzEYhCNWsFv7AnqTF9g12WTzJ5dlaatQEDxceFWyyb8a2RObLdK3t2K9GmbgG5hJyKzrOyTklrOMc2buy3JdrrOc8TxTQkit4YIsDWguFQguRW4uSfJveDEjc6YlSwG0uSZJjF-MMamVnJP31TA0wdkqNGE60r6mMbRDg3Tov3GktrPNMYZIp57GaUTbUheGTxwjdX13Sg5uQk8PMXQftD00U_hld5uX53hDrmrbRFyedUHeNuvX8iHdPW0fy9UuDRyKKdVGOaaVZqqutZVGApz2VM7lHoDn3FhtPVZVUQAiM5WvDbjKCuWFBw9cLMjdX29AxP0whtaOx_35FvEDNIlX1g
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/CCECE.2012.6334887
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781467314329
1467314331
9781467314336
1467314323
EndPage 6
ExternalDocumentID 6334887
Genre orig-research
GroupedDBID 29F
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
ID FETCH-LOGICAL-i175t-896c086806ff8a49477488bcc2d771219a8adebb557ee09bdf97cba36d3d7d713
IEDL.DBID RIE
ISBN 1467314315
9781467314312
ISSN 0840-7789
IngestDate Wed Aug 27 03:41:52 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-896c086806ff8a49477488bcc2d771219a8adebb557ee09bdf97cba36d3d7d713
PageCount 6
ParticipantIDs ieee_primary_6334887
PublicationCentury 2000
PublicationDate 2012-April
PublicationDateYYYYMMDD 2012-04-01
PublicationDate_xml – month: 04
  year: 2012
  text: 2012-April
PublicationDecade 2010
PublicationTitle 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)
PublicationTitleAbbrev CCECE
PublicationYear 2012
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0004864
ssj0000818135
Score 1.5056206
Snippet In recent years, the hardware implementation of stream ciphers has attracted the interest of many designers, mainly due to their low implementation area on a...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Clocks
Equations
Hardware
LILI-128
Power demand
Registers
Simple Power Analysis
Stream cipher
Title Applicability of simple power analysis to stream ciphers constructed using multiple LFSRs
URI https://ieeexplore.ieee.org/document/6334887
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLXaTrDwaBFveWAkaRLbsTOiqFWFKEJApTJVftygCtFUajrA12Pn0QJiYIszJLZjxeden3MuQleGRiGwUHrgkhuUgPKktGsZLHw1hjIBiRMKj-_j0YTeTtm0ha43WhgAKMln4LvL8izf5HrtUmX92MlGBW-jtg3cKq3WJp_irNlCsoW-VFTWUcIx5rhISlFXzInFByFrvJ7qdtSoaYKkn6aDdOAoX5Ffv-5H3ZVy2xnuoXHT4Ypt8uavC-Xrz19ejv8d0T7qbQV--GGzdR2gFiwO0e43b8IuermpjrZL8uwHzjO8mjsnYbx0ddWwrM1McJFjpzeR71jPnUXBCuu8dqUFgx2t_hU3rEV8N3x6XPXQZDh4TkdeXYfBm1twUXgiibWNfEQQZ5mQNKEWMgqhtI4M56H95UkhDSjFGAcIEmWyhGslSWyI4cZGwUeos8gXcIwwIxEPKLewkBEKEVeZIDLTTBgw0j7qBHXdJM2WldXGrJ6f079vn6Ed96EqIs056tixwYXFCIW6LBfHF9vdtVA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwGLVKGYCFo0XceGAkoUns2BlR1KpAWyFopTJVPr6gCtFUajrAr8fO0QJiYHM8OPGh-Pnze-9D6EoT3wPqCQdscIMEIB0hzFoGA1-1JpRDZIXC_UHYHZH7MR3X0PVKCwMAOfkMXFvM7_J1qpY2VHYTWtkoZxtok1oxbqHWWkVUrDmbF6zBL-GFeRS3nDnGo1zWFbLAIASPVm5P5bNf6Wla0U0ct-O2JX35bvnCH5lX8o2ns4v61ScXfJM3d5lJV33-cnP8b5_2UHMt8cOPq81rH9VgdoB2vrkTNtDLbXG5ndNnP3Ca4MXUegnjuc2shkVpZ4KzFFvFiXjHampNChZYpaUvLWhsifWvuOIt4l7n-WnRRKNOexh3nTITgzM18CJzeBQqc_bhrTBJuCARMaCRc6mUrxnzzE9PcKFBSkoZQCuSOomYkiIIdaCZNufgQ1SfpTM4QpgGPmsRZoAhDQj4TCY8EImiXIMWpqlj1LCDNJkXZhuTcnxO_q6-RFvdYb836d0NHk7Rtp20glZzhuqmn3BuEEMmL_KF8gWEvriY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+25th+IEEE+Canadian+Conference+on+Electrical+and+Computer+Engineering+%28CCECE%29&rft.atitle=Applicability+of+simple+power+analysis+to+stream+ciphers+constructed+using+multiple+LFSRs&rft.au=Zadeh%2C+A.+A.&rft.au=Heys%2C+H.+M.&rft.date=2012-04-01&rft.pub=IEEE&rft.isbn=9781467314312&rft.issn=0840-7789&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FCCECE.2012.6334887&rft.externalDocID=6334887
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0840-7789&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0840-7789&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0840-7789&client=summon