Cryptology ePrint Archive: Report 2014/999

First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA

Yongdae Kim and Hyunsoo Yoon

Abstract: The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. It is based on Addition, rotation, XOR operations for 32-bit words. Because of its structure,it is useful for several devices to achieve a high speed of encryption and low-power consumption.However, side-channel attacks on LEA implementations have not been examined.In this study, we perform a power analysis attack on LEA. We implemented LEA with 128-bit key size on FPGA in a straightforward manner. Our experimental results show that we can successfully retrieve a 128-bit master key by attacking a first round encryption.

Category / Keywords: secret-key cryptography / power analysis attack, LEA, ARX, correlation power analysis, side-channel attack

Date: received 16 Dec 2014

Contact author: kimyd at ensec re kr

Available format(s): PDF | BibTeX Citation

Version: 20141218:034501 (All versions of this report)

Short URL: ia.cr/2014/999

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]