You are looking at a specific version 20141218:034501 of this paper. See the latest version.

Paper 2014/999

First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA

Yongdae Kim and Hyunsoo Yoon

Abstract

The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. It is based on Addition, rotation, XOR operations for 32-bit words. Because of its structure,it is useful for several devices to achieve a high speed of encryption and low-power consumption.However, side-channel attacks on LEA implementations have not been examined.In this study, we perform a power analysis attack on LEA. We implemented LEA with 128-bit key size on FPGA in a straightforward manner. Our experimental results show that we can successfully retrieve a 128-bit master key by attacking a first round encryption.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MAJOR revision.
Keywords
power analysis attackLEAARXcorrelation power analysisside-channel attack
Contact author(s)
kimyd @ ensec re kr
History
2014-12-18: received
Short URL
https://ia.cr/2014/999
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.