Paper 2014/999

First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA

Yongdae Kim and Hyunsoo Yoon

Abstract

The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. It is based on Addition, rotation, XOR operations for 32-bit words. Because of its structure,it is useful for several devices to achieve a high speed of encryption and low-power consumption.However, side-channel attacks on LEA implementations have not been examined.In this study, we perform a power analysis attack on LEA. We implemented LEA with 128-bit key size on FPGA in a straightforward manner. Our experimental results show that we can successfully retrieve a 128-bit master key by attacking a first round encryption.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MAJOR revision.
Keywords
power analysis attackLEAARXcorrelation power analysisside-channel attack
Contact author(s)
kimyd @ ensec re kr
History
2014-12-18: received
Short URL
https://ia.cr/2014/999
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/999,
      author = {Yongdae Kim and Hyunsoo Yoon},
      title = {First Experimental Result of Power Analysis Attacks on a {FPGA} Implementation of {LEA}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/999},
      year = {2014},
      url = {https://eprint.iacr.org/2014/999}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.