Paper 2014/999
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
Yongdae Kim and Hyunsoo Yoon
Abstract
The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. It is based on Addition, rotation, XOR operations for 32-bit words. Because of its structure,it is useful for several devices to achieve a high speed of encryption and low-power consumption.However, side-channel attacks on LEA implementations have not been examined.In this study, we perform a power analysis attack on LEA. We implemented LEA with 128-bit key size on FPGA in a straightforward manner. Our experimental results show that we can successfully retrieve a 128-bit master key by attacking a first round encryption.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Preprint. MAJOR revision.
- Keywords
- power analysis attackLEAARXcorrelation power analysisside-channel attack
- Contact author(s)
- kimyd @ ensec re kr
- History
- 2014-12-18: received
- Short URL
- https://ia.cr/2014/999
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/999, author = {Yongdae Kim and Hyunsoo Yoon}, title = {First Experimental Result of Power Analysis Attacks on a {FPGA} Implementation of {LEA}}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/999}, year = {2014}, url = {https://eprint.iacr.org/2014/999} }