ARIA is a 128-bit symmetric block cipher having 128-bit, 192-bit, or 256-bit key lengths. The cipher is a substitution-permutation encryption network (SPN) that uses an involutional binary matrix. This paper shows that a careless implementation of ARIA on smartcards is vulnerable to a differential power analysis attack. This attack is realistic because we can measure power consumption signals at two kinds of S-boxes and two types of substitution layers. By analyzing the power traces, we can find all round keys and also extract a master key from only two round keys using circular rotation, XOR, and involutional operations for two types of layers. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Ha, J. C., Kim, C. K., Moon, S. J., Park, I. H., & Yoo, H. S. (2005). Differential power analysis on block cipher ARIA. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3726 LNCS, pp. 541–548). https://doi.org/10.1007/11557654_63
Mendeley helps you to discover research relevant for your work.