Enocoro-128v2 is a lightweight stream cipher submitted to Cryptography Research and Evaluation Committees (CRYPTREC). In this paper, we first describe a side channel attack on Enocoro-128v2. We show that all secret key bytes of Enocoro-128v2 can be recovered by correlation power analysis, and it is shown by an experiment that around 6000 traces are needed to recover the secret key on SASEBO-GII (Side-channel Attack Standard Evaluation Board). We second propose a countermeasure with threshold implementation technique, which allows Enocoro-128v2 to be resistant against correlation power analysis as long as less than 105 traces are used.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Shugo MIKAMI, Hirotaka YOSHIDA, Dai WATANABE, Kazuo SAKIYAMA, "Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2" in IEICE TRANSACTIONS on Fundamentals,
vol. E96-A, no. 3, pp. 697-704, March 2013, doi: 10.1587/transfun.E96.A.697.
Abstract: Enocoro-128v2 is a lightweight stream cipher submitted to Cryptography Research and Evaluation Committees (CRYPTREC). In this paper, we first describe a side channel attack on Enocoro-128v2. We show that all secret key bytes of Enocoro-128v2 can be recovered by correlation power analysis, and it is shown by an experiment that around 6000 traces are needed to recover the secret key on SASEBO-GII (Side-channel Attack Standard Evaluation Board). We second propose a countermeasure with threshold implementation technique, which allows Enocoro-128v2 to be resistant against correlation power analysis as long as less than 105 traces are used.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E96.A.697/_p
Copy
@ARTICLE{e96-a_3_697,
author={Shugo MIKAMI, Hirotaka YOSHIDA, Dai WATANABE, Kazuo SAKIYAMA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2},
year={2013},
volume={E96-A},
number={3},
pages={697-704},
abstract={Enocoro-128v2 is a lightweight stream cipher submitted to Cryptography Research and Evaluation Committees (CRYPTREC). In this paper, we first describe a side channel attack on Enocoro-128v2. We show that all secret key bytes of Enocoro-128v2 can be recovered by correlation power analysis, and it is shown by an experiment that around 6000 traces are needed to recover the secret key on SASEBO-GII (Side-channel Attack Standard Evaluation Board). We second propose a countermeasure with threshold implementation technique, which allows Enocoro-128v2 to be resistant against correlation power analysis as long as less than 105 traces are used.},
keywords={},
doi={10.1587/transfun.E96.A.697},
ISSN={1745-1337},
month={March},}
Copy
TY - JOUR
TI - Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 697
EP - 704
AU - Shugo MIKAMI
AU - Hirotaka YOSHIDA
AU - Dai WATANABE
AU - Kazuo SAKIYAMA
PY - 2013
DO - 10.1587/transfun.E96.A.697
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E96-A
IS - 3
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - March 2013
AB - Enocoro-128v2 is a lightweight stream cipher submitted to Cryptography Research and Evaluation Committees (CRYPTREC). In this paper, we first describe a side channel attack on Enocoro-128v2. We show that all secret key bytes of Enocoro-128v2 can be recovered by correlation power analysis, and it is shown by an experiment that around 6000 traces are needed to recover the secret key on SASEBO-GII (Side-channel Attack Standard Evaluation Board). We second propose a countermeasure with threshold implementation technique, which allows Enocoro-128v2 to be resistant against correlation power analysis as long as less than 105 traces are used.
ER -