[Resource Topic] 2013/190: Power Analysis Attacks against FPGA Implementations of KLEIN

Welcome to the resource topic for 2013/190

Title:
Power Analysis Attacks against FPGA Implementations of KLEIN

Authors: Shaohua Tang, Jianhao Wu, Weijian Li, Zheng Gong

Abstract:

KLEIN is a family of block ciphers proposed by Zheng Gong et al. at RFIDSec 2011, and its lightweight features are suitable for resource-constrained devices. However, the original design of KLEIN does not consider the potential attacks by power analysis methods. This paper presents power analysis attacks against a FPGA implementation of KLEIN by the authors of KLEIN. The attacking strategy, attacking point and complexity of our attacks via power analysis against KLEIN are discussed in detail. Besides, the implementation of the attacks is also described, and the experimental data is given. A lot of attacking experiments are launched by this paper, and the experiments confirm that the success probability of our attacks is nearly 100%. Finally, a defensive countermeasure against our attacks is proposed.

ePrint: https://eprint.iacr.org/2013/190

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .