Side-channel analysis of the K2 stream cipher

  • Authors:
  • Matt Henricksen;Wun She Yap;Chee Hoo Yian;Shinsaku Kiyomoto;Toshiaki Tanaka

  • Affiliations:
  • Institute for Infocomm Research, A*STAR, Singapore;Institute for Infocomm Research, A*STAR, Singapore;Institute for Infocomm Research, A*STAR, Singapore;KDDI R&D Laboratories Inc., Fujimino-shi, Saitama, Japan;KDDI R&D Laboratories Inc., Fujimino-shi, Saitama, Japan

  • Venue:
  • ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we provide the first side-channel analysis of the K2 stream cipher. K2 is a fast and secure stream cipher built upon the strengths of SNOW 2.0. We apply timing attacks, power analysis, and differential fault analysis to K2. We show that naively implemented K2 is vulnerable to cache-timing attacks, and describe how to implement efficient countermeasures to protect K2 against side-channel attacks in hardware and software.