Paper 2010/012

Differential Cache Trace Attack Against CLEFIA

Chester Rebeiro and Debdeep Mukhopadhyay

Abstract

The paper presents a differential cache trace attack against CLEFIA, a $128$ bit block cipher designed by Sony Corporation. The attack shows that such ciphers based on the generalized Feistel structures leak information of the secret key if the cache trace pattern is revealed to an adversary. The attack that we propose is a three staged attack and reveals the entire key with $2^{43}$ CLEFIA encryptions. The attack is simulated on an Intel Core 2 Duo Processor with a cache architecture with $32$ byte lines as a target platform.

Metadata
Available format(s)
PDF PS
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
chetrebeiro @ gmail com
History
2010-01-12: received
Short URL
https://ia.cr/2010/012
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/012,
      author = {Chester Rebeiro and Debdeep Mukhopadhyay},
      title = {Differential Cache Trace Attack Against CLEFIA},
      howpublished = {Cryptology ePrint Archive, Paper 2010/012},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/012}},
      url = {https://eprint.iacr.org/2010/012}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.