Differential power analysis on block cipher ARIA

12Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

ARIA is a 128-bit symmetric block cipher having 128-bit, 192-bit, or 256-bit key lengths. The cipher is a substitution-permutation encryption network (SPN) that uses an involutional binary matrix. This paper shows that a careless implementation of ARIA on smartcards is vulnerable to a differential power analysis attack. This attack is realistic because we can measure power consumption signals at two kinds of S-boxes and two types of substitution layers. By analyzing the power traces, we can find all round keys and also extract a master key from only two round keys using circular rotation, XOR, and involutional operations for two types of layers. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Ha, J. C., Kim, C. K., Moon, S. J., Park, I. H., & Yoo, H. S. (2005). Differential power analysis on block cipher ARIA. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3726 LNCS, pp. 541–548). https://doi.org/10.1007/11557654_63

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free