Paper 2019/305
Practical Algebraic Side-Channel Attacks Against ACORN
Alexandre Adomnicai, Laurent Masson, and Jacques J. A. Fournier
Abstract
The authenticated cipher ACORN is one of the two finalists of the CAESAR competition and is intended for lightweight applications. Because such use cases require protection against physical attacks, several works have been undertaken to achieve secure implementations. Although dedicated threshold and masked schemes have been proposed, no practical side-channel attack against ACORN has been published in the literature yet. It has been theoretically demonstrated that ACORN is vulnerable against differential power analysis but the feasibility of the attack has not been validated in a practical manner. This paper details the results obtained when putting the attack into practice against a software implementation running on a 32-bit micro-controller. Especially, these practical results led us to propose two variants of the reference attack: one that requires less knowledge of initial vectors and another one that is less prone to errors in practice and requires fewer acquisitions.
Note: Fixed a mistake: during the ACORN state update, it is only possible to parallelize up to 33 steps and not 37 as mentioned in the published version.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Minor revision. ICISC 2018
- Keywords
- ACORNAEADSide-Channel
- Contact author(s)
- alex adomnicai @ gmail com
- History
- 2019-03-20: received
- Short URL
- https://ia.cr/2019/305
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/305, author = {Alexandre Adomnicai and Laurent Masson and Jacques J. A. Fournier}, title = {Practical Algebraic Side-Channel Attacks Against {ACORN}}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/305}, year = {2019}, url = {https://eprint.iacr.org/2019/305} }