Side-channel analysis of the K2 stream cipher

11Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we provide the first side-channel analysis of the K2 stream cipher. K2 is a fast and secure stream cipher built upon the strengths of SNOW 2.0. We apply timing attacks, power analysis, and differential fault analysis to K2. We show that naively implemented K2 is vulnerable to cache-timing attacks, and describe how to implement efficient countermeasures to protect K2 against side-channel attacks in hardware and software. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Henricksen, M., Yap, W. S., Yian, C. H., Kiyomoto, S., & Tanaka, T. (2010). Side-channel analysis of the K2 stream cipher. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6168 LNCS, pp. 53–73). https://doi.org/10.1007/978-3-642-14081-5_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free