Paper 2005/338
An Improved Power Analysis Attack Against Camellia's Key Schedule
Lu Xiao and Howard M. Heys
Abstract
This paper presents an improved simple power analysis attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power measurements, in this paper, two variants of the simple power analysis attack are presented and shown to be tolerant of errors that might occur in the Hamming weight determinations. In practical applications of the attack such errors are likely to occur due to noise and distortion in the power measurements and their mapping to the Hamming weights of the data. Further, we propose a practical method to evaluate the susceptibility of other block ciphers to simple power analysis attacks. To resist these attacks, the required design rationale of key schedules and several practical countermeasures are suggested.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Not published.
- Keywords
- block cipherscryptanalysisimplementationsecret-key cryptographysmart cardsside channel attacks
- Contact author(s)
- howard @ engr mun ca
- History
- 2005-09-27: received
- Short URL
- https://ia.cr/2005/338
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2005/338, author = {Lu Xiao and Howard M. Heys}, title = {An Improved Power Analysis Attack Against Camellia's Key Schedule}, howpublished = {Cryptology {ePrint} Archive, Paper 2005/338}, year = {2005}, url = {https://eprint.iacr.org/2005/338} }