Secure implementation of stream cipher: Trivium

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Trivium is a hardware oriented synchronous stream cipher designed by Christophe De Cannière and Bart Preneel [7]. Trivium is one of the eSTREAM final portfolio cipher. Regardless of the security of the cipher in theory, implementation attacks like Differential Power Analysis (DPA) attack [10,12,18] and Fault attack [9] on Trivium were observed. DPA attack of Trivium exploits the re-synchronization phase of the algorithm to reveal the key. In this paper, we analyse various implementation techniques as countermeasures for Trivium stream cipher against DPA attack. First, we present Threshold Implementation (TI) of Trivium using random mask value. Second, we propose algorithm level changes (Modified Trivium) to counteract the attack, which introduces negligible resource overhead to the implementation. Third, random accelerator concept is introduced for parallel architecture along with combined techniques of TI and algorithm level changes to further increase the attack complexity. Finally, we present comparative study on the performance of Trivium for the proposed techniques.

Cite

CITATION STYLE

APA

Shanmugam, D., & Annadurai, S. (2015). Secure implementation of stream cipher: Trivium. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9522, pp. 253–266). Springer Verlag. https://doi.org/10.1007/978-3-319-27179-8_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free