Cryptology ePrint Archive: Report 2014/999
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
Yongdae Kim and Hyunsoo Yoon
Abstract: The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. It is based on Addition, rotation, XOR operations for 32-bit words. Because of its structure,it is useful for several devices to achieve a high speed of encryption and low-power consumption.However, side-channel attacks on LEA implementations have not been examined.In this study, we perform a power analysis attack on LEA. We implemented LEA with 128-bit key size on FPGA in a straightforward manner. Our experimental results show that we can successfully retrieve a 128-bit master key by attacking a first round encryption.
Category / Keywords: secret-key cryptography / power analysis attack, LEA, ARX, correlation power analysis, side-channel attack
Date: received 16 Dec 2014
Contact author: kimyd at ensec re kr
Available format(s): PDF | BibTeX Citation
Version: 20141218:034501 (All versions of this report)
Short URL: ia.cr/2014/999
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]