Open Access Article

Title: Correlation power analysis attack on software implementation of TRIVIUM stream cipher

Authors: Rangana De Silva; Iranga Navarathna; Malitha Kumarasiri; Chai Wen Chuah; Janaka Alawatugoda

Addresses: Department of Computer Engineering, University of Peradeniya, Sri Lanka ' Department of Computer Engineering, University of Peradeniya, Sri Lanka ' Department of Computer Engineering, University of Peradeniya, Sri Lanka ' Department of Information Security and Web Technology, Tun Hussein Onn University of Malaysia, Malaysia ' Rabdan Academy, Dhafeer Street, Abu Dhabi, UAE

Abstract: Power analysis attacks are a category of attacks against cryptographic implementations. In this case, the power consumption of a cryptosystem is analysed to extract its secret values such as secret keys and key streams. This has become a huge threat to modern day cryptosystems. Therefore, identifying cryptographic implementations which are vulnerable to power analysis attacks is very important. Many studies have been carried out on power analysis attacks on block cipher implementations, but relatively less number of studies have been carried out on power analysis attacks on stream cipher implementations. This paper presents a power analysis attack on a software implementation of TRIVIUM stream cipher. In order to analyse the power consumption, correlation power analysis (CPA) is done, and the keystream is successfully recovered.

Keywords: side-channel attacks; correlation power analysis attacks; stream ciphers; TRIVIUM.

DOI: 10.1504/IJICS.2022.127156

International Journal of Information and Computer Security, 2022 Vol.19 No.3/4, pp.379 - 401

Received: 21 Nov 2021
Accepted: 26 Feb 2022

Published online: 23 Nov 2022 *