Loading...
Search for: correlation-attacks
0.005 seconds

    Fast correlation attacks on the summation generator

    , Article Journal of Cryptology ; Volume 13, Issue 2 , 2000 , Pages 245-262 ; 09332790 (ISSN) Golić, J. D ; Salmasizadeh, M ; Dawson, E ; Sharif University of Technology
    Springer New York  2000
    Abstract
    Abstract. The linear sequential circuit approximation method for combiners with memory is used to find mutually correlated linear transforms of the input and output sequences in the well-known summation generator with any number of inputs. It is shown that the determined correlation coefficient is large enough for applying a fast correlation attack to the output sequence to reconstruct the initial states of the input linear feedback shift registers. The proposed attack is based on iterative probabilistic decoding and appropriately generated low-weight parity-checks. The required output sequence length and the computational complexity are both derived. Successful experimental results for the... 

    Zero correlation linear attack on reduced round Piccolo-80

    , Article 13th International ISC Conference on Information Security and Cryptology, 7 September 2016 through 8 September 2016 ; 2016 , Pages 66-71 ; 9781509039494 (ISBN) Ahangarkolaei, M. Z ; Hoseini Najarkolaei, S. R ; Ahmadi, S ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Universal deployment of lightweight block ciphers increase the importance of cryptanalysis of these ciphers. In this paper, we focus on reduced round version of Piccolo-80 as a lightweight block cipher and try to analyze it by zero correlation linear attack. As a result, we proposed a new zero correlation linear attack on 12-round Piccolo-80 without whitening keys with computational complexity of 251.4, while memory and data complexities of the attack are equal to 258.2 and 250, respectively. Also, we proposed an attack on 12-round Piccolo-80 with whitening keys and 13-round Piccolo-80 without whitening keys. To the best of our knowledge, these are the first zero correlation attacks on... 

    A Power Analysis Countermeasure for a Lightweight Symetric Block Cipher

    , M.Sc. Thesis Sharif University of Technology Safaei Pour, Morteza (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Moradi, Amir (Co-Advisor)
    Abstract
    Among cryptography devices, resource constrained devices like sensors, RFID tags, smart cards and etc need a special class of cryptography algorithms. These devices have three limitations: memory, consumed power and computing power. Therefore, need a special class of cryptography algorithms that is lightweight cryptography. Lightweight cryptography systems have features and limitations that make them more vulnerable against attacks such as power analysis attacks. For this reason strengthening them against these attacks need more attention. So far, various countermeasure for secure implementation of different cryptography systems proposed. Most of them trying to decrease the correlation... 

    A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption

    , Article 13th International ISC Conference on Information Security and Cryptology, 7 September 2016 through 8 September 2016 ; 2016 , Pages 38-45 ; 9781509039494 (ISBN) Safaeipour, M ; Salmasizadeh, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. We propose a new heuristic encoding scheme for implementing block cipher algorithms. Our new method includes only AND-equivalent and XOR-equivalent operations since every cryptographic algorithm can be implemented with two basic operations, namely AND, XOR. In order to practically evaluate resistance improvement against CPA, we implement the proposed coding scheme on SIMON, a lightweight block cipher, on a smartcard with ATmega163 microprocessor. The results of this implementation show a 350 times more...