Paper 2014/644
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Ravikumar Selvam, Dillibabu Shanmugam, and Suganya Annadurai
Abstract
Over a decade, cryptographers are more attentive on designing lightweight ciphers in focus to compact cryptographic devices. More often, the security of these algorithms are defined in terms of its resistance to mathematical cryptanalysis methods. Nevertheless, designers are well aware of implementation attacks and concentrating on new design strategies to improve the defence quality against implementation attack. PRINCE ~\cite{Julia2012} and RECTANGLE ~\cite{cryptoeprint:2014:084} lightweight block ciphers are designed using new design strategies for efficiency and security. In this paper we analyse the security of PRINCE and RECTANGLE against a type of implementation attack called Differential Power Analysis (DPA) attack. Our attack reduces key search space from $2^{128}$ to $33008$ for PRINCE and $2^{80}$ to $288$ for RECTANGLE.
Note: Generic DPA on PRINCE and RECTANGLE Block Cipher
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Lightweight block cipherpower characteristicFPGA implementationdifferential power analysis
- Contact author(s)
-
ravikumar @ setsindia net
dillibabu @ setsindia net
asuganya @ setsindia net - History
- 2014-08-28: revised
- 2014-08-27: received
- See all versions
- Short URL
- https://ia.cr/2014/644
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/644, author = {Ravikumar Selvam and Dillibabu Shanmugam and Suganya Annadurai}, title = {Side Channel Attacks: Vulnerability Analysis of {PRINCE} and {RECTANGLE} using {DPA}}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/644}, year = {2014}, url = {https://eprint.iacr.org/2014/644} }