Paper 2005/338

An Improved Power Analysis Attack Against Camellia's Key Schedule

Lu Xiao and Howard M. Heys

Abstract

This paper presents an improved simple power analysis attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power measurements, in this paper, two variants of the simple power analysis attack are presented and shown to be tolerant of errors that might occur in the Hamming weight determinations. In practical applications of the attack such errors are likely to occur due to noise and distortion in the power measurements and their mapping to the Hamming weights of the data. Further, we propose a practical method to evaluate the susceptibility of other block ciphers to simple power analysis attacks. To resist these attacks, the required design rationale of key schedules and several practical countermeasures are suggested.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Not published.
Keywords
block cipherscryptanalysisimplementationsecret-key cryptographysmart cardsside channel attacks
Contact author(s)
howard @ engr mun ca
History
2005-09-27: received
Short URL
https://ia.cr/2005/338
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/338,
      author = {Lu Xiao and Howard M.  Heys},
      title = {An Improved Power Analysis Attack Against Camellia's Key Schedule},
      howpublished = {Cryptology ePrint Archive, Paper 2005/338},
      year = {2005},
      note = {\url{https://eprint.iacr.org/2005/338}},
      url = {https://eprint.iacr.org/2005/338}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.