You are looking at a specific version 20201119:094517 of this paper.
See the latest version.
Paper 2020/1455
An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage
Yan Yan and Elisabeth Oswald and Srinivas Vivek
Abstract
In the last few years a new design paradigm, the so-called ARX (modular addition, rotation, exclusive-or) ciphers, have gained popularity in part because of their non-linear operation's seemingly `inherent resilience' against Differential Power Analysis (DPA) Attacks: the non-linear modular addition is not only known to be a poor target for DPA attacks, but also the computational complexity of DPA-style attacks grows exponentially with the operand size and thus DPA-style attacks quickly become practically infeasible. We however propose a novel DPA-style attack strategy that scales linearly with respect to the operand size in the chosen-message attack setting.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. ICISSP 2021
- Keywords
- ARX constructionSide-channel analysisHamming weightChosen plaintext attack
- Contact author(s)
- yanyansmajesty @ gmail com
- History
- 2020-11-19: received
- Short URL
- https://ia.cr/2020/1455
- License
-
CC BY