Paper 2011/165
Improved Side Channel Cube Attacks on PRESENT
XinJie Zhao, Tao Wang, and ShiZe Guo
Abstract
The paper presents several improved side channel cube attacks on PRESENT based on single bit leakage model. Compared with the previous study of Yang et al in CANS 2009 [30], based on the same model of single bit leakage in the 3rd round, we show that: if the PRESENT cipher structure is unknown, for the leakage bit 0, 32-bit key can be recovered within
Note: Make some corrections of PRESENT-80 attack.
Metadata
- Available format(s)
-
PDF
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Side channel attacksCube attackblack box attackdivide and conquersliding windowiterated attackPRESENT-80128
- Contact author(s)
- zhaoxinjieem @ 163 com
- History
- 2011-04-10: last of 5 revisions
- 2011-04-04: received
- See all versions
- Short URL
- https://ia.cr/2011/165
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/165, author = {XinJie Zhao and Tao Wang and ShiZe Guo}, title = {Improved Side Channel Cube Attacks on {PRESENT}}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/165}, year = {2011}, url = {https://eprint.iacr.org/2011/165} }