[Resource Topic] 2011/707: Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF

Welcome to the resource topic for 2011/707

Title:
Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF

Authors: Alex Biryukov, Ilya Kizhvatov, Bin Zhang

Abstract:

SecureMemory (SM), CryptoMemory (CM) and CryptoRF (CR) are the Atmel chip families with wide applications in practice. They implement a proprietary stream cipher, which we call the Atmel cipher, to provide authenticity, confidentiality and integrity. At CCS’2010, it was shown that given 1 keystream frame, the secret key in SM protected by the simple version of the cipher can be recovered in 2^{39.4} cipher ticks and if 2640 keystream frames are available, the secret key in CM guarded by the more complex version of the cipher can be restored in 2^{58} cipher ticks. In this paper, we show much more efficient and practical attacks on both versions of the Atmel cipher. The idea is to dynamically reconstruct the internal state of the underlying register by exploiting the different diffusion speeds of the different cells. For SM, we can recover the secret key in 2^{29.8} cipher ticks given 1 keystream frame; for CM, we can recover the secret key in 2^{50} cipher ticks with around 24 frames. Practical implementation of the full attack confirms our results.

ePrint: https://eprint.iacr.org/2011/707

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .