Abstract
In the last few years a new design paradigm, the so-called ARX (modular addition, rotation, exclusive-or) ciphers, have gained popularity in part because of their non-linear operation’s seemingly ‘inherent resilience’ against Differential Power Analysis (DPA) Attacks: the non-linear modular addition is not only known to be a poor target for DPA attacks, but also the computational complexity of DPA-style attacks grows exponentially with the operand size and thus DPA-style attacks quickly become practically infeasible. We however propose a novel DPA-style attack strategy that scales linearly with respect to the operand size in the chosen-message attack setting.
Original language | English |
---|---|
Title of host publication | Proceedings of the 7th International Conference on Information Systems Security and Privacy - ICISSP |
Publisher | SCITEPRESS, Science and Technology Publications, Lda |
Pages | 89-97 |
Number of pages | 9 |
ISBN (Print) | 9789897584916 |
DOIs | |
Publication status | Published - Feb 2021 |
Event | 7th International Conference on Information Systems Security and Privacy, ICISSP 2021 - Virtual, Online Duration: 11 Feb 2021 → 13 Feb 2021 |
Publication series
Name | International Conference on Information Systems Security and Privacy |
---|---|
ISSN (Electronic) | 2184-4356 |
Conference
Conference | 7th International Conference on Information Systems Security and Privacy, ICISSP 2021 |
---|---|
City | Virtual, Online |
Period | 11/02/21 → 13/02/21 |
Bibliographical note
Funding Information:This work has been funded in parts by the European Union (EU) via the ERC project 725042 (acronym SEAL). The third author’s work was funded by the INSPIRE Faculty Award (DST, Govt. of India).
Publisher Copyright:
© 2021 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved.
Keywords
- ARX Construction
- Chosen Plaintext Attack
- Hamming Weight
- Side-channel Analysis
ASJC Scopus subject areas
- Computer Science (miscellaneous)
- Information Systems