Practical algebraic side-channel attacks against acorn

2Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The authenticated cipher ACORN is one of the two finalists of the CAESAR competition and is intended for lightweight applications. Because such use cases require protection against physical attacks, several works have been undertaken to achieve secure implementations. Although dedicated threshold and masked schemes have been proposed, no practical side-channel attack against ACORN has been published in the literature yet. It has been theoretically demonstrated that ACORN is vulnerable against differential power analysis but the feasibility of the attack has not been validated in a practical manner. This paper details the results obtained when putting the attack into practice against a software implementation running on a 32-bit micro-controller. Especially, these practical results led us to propose two optimizations of the reference attack: one that requires less knowledge of initial vectors and another one that is less prone to errors and requires fewer acquisitions.

Cite

CITATION STYLE

APA

Adomnicai, A., Masson, L., & Fournier, J. J. A. (2019). Practical algebraic side-channel attacks against acorn. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11396 LNCS, pp. 325–340). Springer Verlag. https://doi.org/10.1007/978-3-030-12146-4_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free