Impact of extending side channel attack on cipher variants: a case study with the HC series of stream ciphers

  • Authors:
  • Goutam Paul;Shashwat Raizada

  • Affiliations:
  • Department of Computer Science and Engineering, Jadavpur University, Kolkata, India;Applied Statistics Unit, Indian Statistical Institute, Kolkata, India

  • Venue:
  • SPACE'12 Proceedings of the Second international conference on Security, Privacy, and Applied Cryptography Engineering
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Side channel attacks are extremely implementation specific. An attack is tailor-made for a specific cipher algorithm implemented in a specific model. A natural question is: what is the effect of a side channel technique on a variant of the cipher algorithm implemented in a similar model? The motivation for such an investigation is to study the feasibility of using a cipher variant as a mode of recovering from a successful side channels attack. As a case study, we consider the HC series of stream ciphers, viz., HC-128 and HC-256. We extend the HC-128 fault attack and the HC-256 cache analysis onto the HC-256 and HC-128 ciphers respectively under similar models. The techniques applied on one variant is not trivially translatable to the other and the issue was left open until the current work. We propose a technique to recover half the state of HC-128 using cache analysis, which can be cascaded with the differential attack towards a full state recovery and hence key recovery. Similarly, we analyze the state leakage of HC-256 under differential fault attack model to achieve partial state recovery.