Cryptology ePrint Archive: Report 2016/026

A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM

Abhishek Chakraborty and Debdeep Mukhopadhyay

Abstract: The reported power analysis attacks on hardware implementations of the MICKEY family of streams ciphers require a large number of power traces. The primary motivation of our work is to break an implementation of the cipher when only a limited number of power traces can be acquired by an adversary. In this paper, we propose a novel approach to mount a Template attack (TA) on MICKEY-128 2.0 stream cipher using Particle Swarm Optimization (PSO) generated initialization vectors (IVs). In addition, we report the results of power analysis against a MICKEY-128 2.0 implementation on a SASEBO-GII board to demonstrate our proposed attack strategy. The captured power traces were analyzed using Least Squares Support Vector Machine (LS-SVM) learning algorithm based binary classifiers to segregate the power traces into the respective Hamming distance (HD) classes. The outcomes of the experiments reveal that our proposed power analysis attack strategy requires a much lesser number of IVs compared to a standard Correlation Power Analysis (CPA) attack on MICKEY-128 2.0 during the key loading phase of the cipher.

Category / Keywords: secret-key cryptography /

Original Publication (in the same form): 29th International Conference on VLSI Design

Date: received 11 Jan 2016

Contact author: abhishek chakraborty at cse iitkgp ernet in

Available format(s): PDF | BibTeX Citation

Version: 20160112:080132 (All versions of this report)

Short URL: ia.cr/2016/026

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]