مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

473
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Correlation Power Attack on Hardware Implementation of OCB Authenticated Cipher

Pages

  75-84

Keywords

Authenticated encryption (AE) schemeQ1

Abstract

 Authenticated encryption schemes provide both confidentiality and integrity services simultaneously. To design such schemes, the CAESAR competition was being held with six winners. One of the criteria for evaluation theses ciphers, besides general security, is the security against side-channel attacks, which has been studied less so far. The OCB authenticated cipher, one of the CAESAR’ s winners, has special security properties such as a tweakable block cipher based construction that makes the side-channel attacks challenging. In this paper, for the first time, a 7-stage Correlation power analysis (CPA) attack on nonce processing time is presented to indicate its vulnerability. For this purpose, OCB cipher is implemented on a SAKURA-G.board. By measuring and collecting the power traces on S-box, a successful CPA attack with a zero-value power model is mounted and all bytes of the key are recovered.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    JAHANBANI, MOHSEN, norozi, zeinolabedin, & BAGHERI, NASOUR. (2020). Correlation Power Attack on Hardware Implementation of OCB Authenticated Cipher. ELECTRONIC INDUSTRIES, 11(1 ), 75-84. SID. https://sid.ir/paper/229562/en

    Vancouver: Copy

    JAHANBANI MOHSEN, norozi zeinolabedin, BAGHERI NASOUR. Correlation Power Attack on Hardware Implementation of OCB Authenticated Cipher. ELECTRONIC INDUSTRIES[Internet]. 2020;11(1 ):75-84. Available from: https://sid.ir/paper/229562/en

    IEEE: Copy

    MOHSEN JAHANBANI, zeinolabedin norozi, and NASOUR BAGHERI, “Correlation Power Attack on Hardware Implementation of OCB Authenticated Cipher,” ELECTRONIC INDUSTRIES, vol. 11, no. 1 , pp. 75–84, 2020, [Online]. Available: https://sid.ir/paper/229562/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top