Paper 2014/644

Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA

Ravikumar Selvam, Dillibabu Shanmugam, and Suganya Annadurai

Abstract

Over a decade, cryptographers are more attentive on designing lightweight ciphers in focus to compact cryptographic devices. More often, the security of these algorithms are defined in terms of its resistance to mathematical cryptanalysis methods. Nevertheless, designers are well aware of implementation attacks and concentrating on new design strategies to improve the defence quality against implementation attack. PRINCE ~\cite{Julia2012} and RECTANGLE ~\cite{cryptoeprint:2014:084} lightweight block ciphers are designed using new design strategies for efficiency and security. In this paper we analyse the security of PRINCE and RECTANGLE against a type of implementation attack called Differential Power Analysis (DPA) attack. Our attack reduces key search space from $2^{128}$ to $33008$ for PRINCE and $2^{80}$ to $288$ for RECTANGLE.

Note: Generic DPA on PRINCE and RECTANGLE Block Cipher

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Lightweight block cipherpower characteristicFPGA implementationdifferential power analysis
Contact author(s)
ravikumar @ setsindia net
dillibabu @ setsindia net
asuganya @ setsindia net
History
2014-08-28: revised
2014-08-27: received
See all versions
Short URL
https://ia.cr/2014/644
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/644,
      author = {Ravikumar Selvam and Dillibabu Shanmugam and Suganya Annadurai},
      title = {Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA},
      howpublished = {Cryptology ePrint Archive, Paper 2014/644},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/644}},
      url = {https://eprint.iacr.org/2014/644}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.