Simulated Leakage Power Analysis Attack of the Trivium Stream Cipher

2022 37th Conference on Design of Circuits and Integrated Circuits (DCIS)(2022)

引用 0|浏览1
暂无评分
摘要
In this paper, the theoretical basis for power analysis attacks on the Trivium utilizing leakage current as a side-channel are presented. The analysis is first established in the case of an ideal implementation without the presence of algorithmic noise, and goes on to examine the potential sources of algorithmic noise present in the system, deriving worst case scenario figures of the Pearson Correlation Coefficient (PCC). The same analysis is then performed under the presence of FDSOI random body bias countermeasures. The theoretical analysis are contrasted with simulations of the Trivium cipher under the assumption of a noiseless side-channel, showcasing the theoretical feasibility of utilizing leakage current as a means to attack the cryptosytem.
更多
查看译文
关键词
Cryptography,Side-Channel,Leakage Power,Countermeasures,FDSOI,body bias
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要